CN103635940A - Systems and methods for controlling a locking mechanism using a portable electronic device - Google Patents

Systems and methods for controlling a locking mechanism using a portable electronic device Download PDF

Info

Publication number
CN103635940A
CN103635940A CN201280032878.2A CN201280032878A CN103635940A CN 103635940 A CN103635940 A CN 103635940A CN 201280032878 A CN201280032878 A CN 201280032878A CN 103635940 A CN103635940 A CN 103635940A
Authority
CN
China
Prior art keywords
lock
web services
voucher
user
portable electron
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201280032878.2A
Other languages
Chinese (zh)
Inventor
P·M·格哈特
C·C·罗伯森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apigy Inc
Original Assignee
Apigy Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apigy Inc filed Critical Apigy Inc
Publication of CN103635940A publication Critical patent/CN103635940A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/60Indexing scheme relating to groups G07C9/00174 - G07C9/00944
    • G07C2209/63Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle
    • G07C2209/64Comprising locating means for detecting the position of the data carrier, i.e. within the vehicle or within a certain distance from the vehicle using a proximity sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Abstract

Systems and methods are provided for operating a remotely operable lock. In an example embodiment, a method comprises receiving credentials at a web service from a portable electronic device, authenticating the credentials, and based on a successful authentication, issuing a command for receipt by the lock from the web service or the portable electronic device. In various embodiments, the method may further comprise detecting the proximity of the device to the lock, and in an example embodiment launching a software application on the device in response to the detection. The example methods may further comprise providing an application programming interface at the web service for integrating a second web service or the software application with the web service to allow the portable electronic device to communicate with the lock or web service.

Description

For using portable electron device, control the system and method for locking mechanism
related application
It is the right of priority of the U.S. Provisional Patent Application of No. 61/481518 that the application requires the sequence number that is called " System and Methods for Controlling a Locking Mechanism using a Portable Electronic Device " in name submission on May 2nd, 2011, that invented by people such as Gerhardt, should be in whole by reference this paper and the formation part herein of being incorporated to of first to file.
Technical field
Content disclosed by the invention relates to take the access control that safety is object, and more specifically relate to the means that can use by software, Short Message Service (SMS), long-range frequency identification (RFID), near-field communication (NFC) or other wireless communication means from website, the order remote lock that sends of portable electron device or other computer installation or the electronic access control gear of release.The indefiniteness example of computer installation can be including, but not limited to, laptop PC (PC), Desktop PC, dull and stereotyped PC, smart phone, mobile phone or personal digital assistant.
Background technology
Have much can use split key, with hard-wired reader scanning passive radio frequency identification (RFID) label or press button Yi Xiang access control mechanism on electronic key card and send the electronic lock that the radio signal of encrypting starts.
These devices generally all depend on the hardware component of each user-specific, and if lost or be cracked, so just need system reprogramming and conversion materials more.
Summary of the invention
The disclosure relates to a kind of for example, for network (the Internet) addressable system and web services with can remote-operated lock communicating by letter, and this can remote-operated lock be for example latch (deadbolt lock), door handle lock or the electric control lock (electrical strike) of radio frequency control that can be by the long-range actuating with near server communication of the Internet communication protocol by encrypting.Can from there is Internet connection or be equipped with the portable electron device of Short Message Service (SMS) function and have that network connects such as the so non-mancarried device of desktop PC, access this service.The signing use of individual served the account on relevant website to this.Play this website provides access, manages and configures the effect of the gateway service of electronic lock system capable of making remote access.If user or keeper are the owners of lock server unit, they can authorize other people and access the virtual key shutting mutually.These keys can be interim or permanent.These keys can be during some time or date effectively or effective at any time.The ability that guest invites other people can be authorized or do not authorized to these keys.Their function can at any time be ended or be recovered by the owner, user or keeper.In the embodiment of an example, virtual key can be sent to telephone number or e-mail address.
User can should be used for using web services by executive software on their portable electron device, and this software application can be locked or open lock on door, invites guest, be checked access history; User can also access the website that identical function is provided.User can also be by sending and lock or open the lock on door with the text message of corresponding pin code to a dedicated phone number.According to pin code and checking source telephone number and the phase-locked associated text message of confirming.User also can or change their pin code by other people access of text message mandate.
This system is extracted the access control of the virtual key to accessing from physical electronic device from physical identifier (such as material key or unique key card).Therefore because these keys are stored in safe web server with electronic format, for the loss of the electronic installation of access key, do not representing the loss of key.In addition, virtual access can be long-rangely cancelled, or the password for access key can be at any time changed.On the other hand, physical key lose may need the owner to their lock more new password guarantee Environmental security.
In the embodiment of an example, web services is by the method for network (the Internet) communication between two electronic installations.
W3C is defined as " Web service " " be designed for can mutual operation by network support machine to the mutual software systems of machine ".It has the interface of can processing format (be Web Services Description Language (WSDL) specifically, be abbreviated as WSDL) describing with machine.Other system is used SOAP(Simple Object Access Protocol) message is to be undertaken alternately by mode and the Web service of its explanation regulation, this message is generally to use with the HTTP(HTTP that combines XML (extend markup language) serializing of other Web relevant criterion) transmission.
In this manual, " user " carries out mutual anyone with locking system or Web service, comprises the people who operates as described herein portable electron device.Word " user " and " device " (or " portable electron device ") in some cases can Alternate, because this device is carried and operated by user.
" locking system " or " lock system " comprises " lock ", and these terms sometimes can Alternate.Configuration, description, use and claims to " locking system " or " lock system " have comprised configuration, description, use and the claims to " lock " thus.
In the embodiment of an example, for operate can remote-operated lock system comprise: web services, for receiving voucher from portable electron device; Authenticate received voucher; And when success identity voucher, send the order that will be received by interlocking.This system can also comprise be positioned at lock or contiguous with lock and with this phase-locked associated label, this label makes portable electron device or to receive voucher from this tag recognition.In the embodiment of an example, from portable electron device, receive the order that voucher comprises that reception is inputted at portable electron device by user.Web services can also be issued the software application for installing on portable electron device, and this application can realize voucher or the transmission of order from portable electron device to web services.Web services can also upgrade this application software termly.
In the embodiment of another example, for operate can remote-operated lock system comprise: web services, for detection of portable electron device, close to lock, receive voucher from portable electron device, and send the order that will be received by interlocking.Web services can also authenticate the voucher receiving at web services place, and based on successful authentication, sends the order that will be received by interlocking.
This system can also comprise be positioned at lock or contiguous with lock and with this phase-locked associated label, this label makes portable electron device or to receive voucher from this tag recognition.From portable electron device, receive the order that voucher can comprise that reception is inputted at portable electron device by user.
Web services can also communicate with the software application of installing on portable electron device, and this application can realize voucher or the transmission of order from portable electron device to web services.This system can detect portable electron device close to lock and automatically start software application.
In the embodiment of another example, for operate can remote-operated lock system comprise: the first web services, for receiving voucher or order from the portable electron device of software application is installed, and from this web services, send the order that will be received by interlocking; Wherein this first web services has application programming interface (API), and it is for the second web services or software application and the first web services are combined, so that portable electron device can communicate with lock or web services.
Accompanying drawing explanation
By the explanation with reference to providing in the drawings and specific embodiments, the embodiment of example can be better understood, and its numerous feature and advantage will become apparent for those skilled in the art.For the ease of understanding and simplifying, in the situation that there is identical element in different accompanying drawings, in diagram, adopted identical element method for numbering serial.In the accompanying drawings, similarly Reference numeral can be described the like in different views, and these accompanying drawings are not necessarily to scale.In some cases, different Reference numerals can be described the like in different views.The like reference numerals with letter suffix can represent the different instances of like.Accompanying drawing generally by way of example and the various different embodiments that infinite mode graphic extension is discussed herein.
Fig. 1 illustrates the portable electron device of the outfit NFC function that reads f label.The action of reading tag will trigger application start and activate door lock.
Fig. 2 illustrates the portable electron device of the outfit video camera that reads quick response (QR) code.The action of reading this code will trigger application start and activate door lock.
What Fig. 3 described is the door lock of a type in release and lock-out state.
How the lock server unit that Fig. 4 illustrates user is connected to the service based on cloud by tunnelling user's fire wall.This server is also responsible for inciting somebody to action " locking " and " " code sends to lock in release.
Fig. 5 has provided the another kind configuration of Fig. 4, and wherein server controls electrical relaybox activates electric control lock.
Fig. 6 illustrates the portable electron device of communicating by letter with home server by the Internet.
Fig. 7 is the process flow diagram that introduce to use the step that near-field communication locking or solution lock a door.
Fig. 8 illustrates by by GPS (GPS) coordinate, Wi-Fi tMthe means of the checking of network connectivity, near-field communication, the input of pin code, the identification of QR code and regularly input realize the advantage of system of the multifactor mandate of expansion.
Release is attempted in Fig. 9 description, and it does not have the second portable electron device of the door of access right.In this case, the option that possessory device can be received the notice of the relevant information relevant with requestor and can be provided for locking a door for this requestor's solution.
How Figure 10 can use this system by simple message service (SMS) if illustrating.
Figure 11-30th, according to the relevant parts of having of various example embodiment and the locking system of feature, the schematic diagram of web services.
Figure 31-31G is the chart illustrating according to the method for exemplary method embodiment.
Figure 32-32G is the chart illustrating according to the method for exemplary method embodiment.
Figure 33-33C is the chart illustrating according to the method for exemplary method embodiment.
Figure 34 be take the block diagram of the machine that computer system is exemplary form, can carry out for causing this machine to carry out one group of instruction of any one or more methods of introducing herein in this computer system.
Embodiment
The detailed introduction of illustrated embodiment of the present invention below.Because these embodiments of the present invention are introduced with reference to aforementioned figures, therefore to those skilled in the art, the method for introducing and or the various remodeling of concrete structure or improve and can become apparent.All these remodeling, improvement or modification that depend on the present invention's instruction all will be regarded as within thought of the present invention and scope, and by these remodeling, improvement or modification, these instructions have advanced the development of technology.For example, device in this paper is expressed as in this article by pilot relay or by serial, USB or wireless channel and communicates to carry out the teleinstruction for physical machine, but obviously,, other specialty or family expenses aut.eq. also visit by these means.Therefore, these explanations and accompanying drawing should not be considered to have the meaning of restriction, because be readily appreciated that, the present invention is confined to absolutely not illustrated embodiment.
The disclosure relates to a kind of for comprise system and the service of the electronic installation of operable locks from portable electron device remote activation.This system is constructed in complete modular mode, in order that provide and keep the configurable degree of the authentication of balance about the efficient and applicable mechanism of accessibility.Other system or be not configurable like this, otherwise so safe, or be not addressable like this.
Fig. 1 illustrates the portable electron device (100) of the outfit NFC function that reads passive NFC label (101).NFC label can be according to various standard codes, including, but not limited to ISO/IEC14443(type A and type B the two), various MIFARE implementation and FeliCa.This electronic installation provides inductive energy (103) to NFC label.NFC label is made response with static unified resource designator (URI) (104), and this URI encodes by this way: can start the proprietary application on electronic installation.This URI also comprises for the unique identifier character string of each label.Identical URI can be with the form coding of rapid reaction (QR) code to the surface of label.The action of reading tag will trigger this device and start described application, and described unique string is transmitted as a parameter.Then this application is sent to cloud service by user id, cryptographic hash and unique identifier character string.This information is verified in cloud service, and the action that is associated with unique tags identifier of execution, or this action is carried out in the order as the input on portable electron device based on being sent by user.This action or order are to carry out on the lock being associated with label identifier or lock server, are used for activating door lock 102.Described server sends to described electronic installation by the acknowledge message performing an action.
Fig. 2 illustrates the embodiment that the another kind of the processing shown in Fig. 1 can Gong be selected, and the portable electron device that is wherein equipped with video camera reads rapid reaction (QR) code, rather than reads URI by NFC.In this case, the URI mentioning in 104 should be with QR form coding, rather than uses NFC data type.User starts QR code reader application, scans this QR code, and this yard resolved to URI in this application and this application uses the unique identifier embedding in this QR code to carry out the action of actuation lock accordingly.
What Fig. 3 described is the door lock 102 of a type in release 302 and locking (304) state.Stubborn hand (thumbturn) (300) quilt is clockwise or be rotated counterclockwise to drive lock shaft, and this lock shaft will insert or extract doorframe bolt (301).Can carry out this stubborn hand of long-range actuating with encrypting wireless radio transmission, this encryption wireless radio transmission is deciphered by special-purpose on-board circuitry.If successfully decrypted described code, this circuit will start a motor, and this motor will drive the kinematic train of rotation lock shaft.Such door lock is can buy on market, and provides for illustrative purposes here, and in order that provides context to those skilled in the art.
How the lock server (403) that Fig. 4 illustrates user is connected to web services (400) by tunnelling user's fire wall (401).This server is also responsible for the locking and unlocking order (in the disclosure also referred to as " request ") or code send to lock.
Web services (400) is controlled all signals that are routed to terminal lock safely.Thus, it will receive the order of certificate viewer and web services of controlling oneself, and in the situation that all authentication requestings have all been met, they is transferred to the lock of expectation.
For the initial configuration with user side's minimum is correctly passed on order by various network address translation (nat) and firewall system, web services and lock server (403) have participated in containment (SSH) reverse tunnel and have set up.When locking server first connection to Internet connection, it will attempt using SSH implementation to initiate to be connected with one or more security socket layers of web services.If lock server can successfully be connected to web services, this web services will be initiated reverse tunnel, thereby a forwarding port on web services has been bound to the second port on lock server.Adopt in this way, the request that web server receives will be forwarded to lock server, and consults without carry out active with network address translation (nat).Can use firewall rule further to retrain request.Communication protocol between two servers is well-known to those skilled in the art.By making to lock the tunnel that server initiates to arrive web services, web services can be accessed lock server at any time, and without first consulting NAT, has therefore realized more coherent available service.
Lock server (403) can be directly connected to user's Internet service, or more likely by adopting NAT and the router of firewall technology or the Internet service that switch (402) is connected to user.In guard system, whether do not have these parts, reverse tunnel is set up (401) will realize the two-way communication between lock server and web services.
Lock server (403) is safeguarded reverse tunnel (401) and reception and the fill order with web services, to change the state of lock.It is connected to router or Internet service, wired or wireless Internet connection.One is plugged in lock server with the remote control unit of lock radio communication.
Remote unit (404) is directly built in lock server, or is plugged in lock server by the connector such as (but being not limited to) USB.The type that depends on wireless lock, remote unit will obtain a signal and be converted into the form that is suitable for wireless lock.Then this signal will be transferred to lock and be performed by radio frequency.
Between remote unit and lock, carry out bi-directional RF communicate by letter in the situation that, lock can be by beaming back to long-range the reception that a signal carrys out confirmation signal.Also can be like this: lock can be sent back to out of Memory long-range by signal, comprise current battery status and locking any fault of generation.Meanwhile, keypad command signal can be transferred to long-rangely with the lock of relevant keypad, this command signal is sent to web services by lock server then, to do not carry out authenticated with personal electronic device.
Fig. 5 provides another embodiment of the parts that provide in Fig. 4.Here, lock server changes into by such as USB(500) connector be connected to relay and control circuit (501).Can send order by this connector, to indicate disconnection and the closure of single or multiple relays.So can by this way this relay and control circuit be connected to building electric control lock framework: relay can remotely trigger the release of electronic control type lock (3402) in a bit of set period.Door can be opened in the release of the electric control lock on doorjamb and alarm or the security system of any necessity can temporarily be forbidden.
Relay and control circuit can be controlled a plurality of separately addressable relays, thereby lock server can be to a plurality of electric control lock addressing, or according to another optional mode, to other device that can work in coordination with or independently control with relay such as warning system, security system or other electrical equipment, carry out addressing.
Fig. 6 illustrates the electronic installation of communicating by letter with web services by the Internet, and this web services transfers a request to local lock server.This device can communicate with the Internet web services by providing internuncial any data to connect (600), and these data connect including, but not limited to Wi-Fi tM, 3G, EDGE, SMS and Ethernet.
Fig. 7 is the process flow diagram that introduce to use the step that near-field communication locking or solution lock a door.
700, user reads near field communication tag with their portable electron device.NFC label is encoded with application URI and unique code.In general, system-level interface can read any enough near labels automatically according to system-level agreement.In some instances, this device can read NFC label after being introduced into possibly dedicated mode, in this case, should first this electronic installation be set to suitable pattern, to enable NFC read functions.
701, this electronic installation identifies the suitable application of the descriptor binding of URI file type descriptor and startup and this type.In this case, this system starts the application of special-purpose lock and unique ID that the NFC label with just having read is associated sends this application to.
702, this application will notify web services it read label and transmitted relevant unique id of this NFC label simultaneously.Web services will be in this application of 703 authentications, to check read requests to come from legal logon account.If this request is considered to illegal, 709, notify described application.If yet request is legal, 704, web server will be sent to the request corresponding with NFC label id the lock server corresponding with this NFC label id.This request can be locking request, definite time limit release request or switching (toggle) request (sending the request contrary with the request sending before).Lock server can be corresponding with a door lock or a plurality of door lock.
705, lock server will be received in 704 requests of sending and will initiate this request.If lock server unavailable (if for example, this server does not connect power supply), 709, web server will notify this request of application not to be performed.If lock server is available, it will resolve this request.If this request is for example certain door of locking, locks server and will give an order to the hardware unit being associated with this door (404), to initiate locking or unlocking request 706 with lock 102.707, locking 102 will activate.708, if locking successfully, this activates, to lock server and will notify web server, this web server can be notified lock application.
Fig. 8 illustrates by by GPS (GPS) coordinate, Wi-Fi tMthe means of the checking of network connectivity, near-field communication, the input of pin code, the identification of QR code and regularly input realize the advantage of system of the multifactor mandate of expansion.
Use the user of smart phone or portable electron device (100) to authenticate by the combination of various authentication methods.
User must be upper by authenticating with operated lock in web service (800), and this is reflected by the cookie storing on user browser.Web services then can be asked the state of user conversation and search and this user-dependent information from this cookie.Then this session status can be transferred to this user, whether indicate them need to provide correct voucher with operated lock by browser.
If lock owner or keeper have made request, additional form of authentication can be pin code (801), wherein before each action of operated lock, will on phone, input this pin code.If the preassigned pin code of this pin code and user matches, for individual part or for a time period, this user can be by authentication (that is, within five minutes, any action for lock can be performed).
Any action that authenticated has been made all will be transferred near this locality lock web server (802) of door (space one side of pinning), and web server is locked in this this locality will trigger the interior relay of dead bolt (strike) that is spliced directly to door lock or door to Long-distance Control or the triggering of the order of door lock wireless transmission then.
As a kind of method of request access door, can be by a passive NFC or RFID(radio-frequency (RF) identification) label (808) is attached to a side.Such passive label still can require user's the electronic installation with NFC or RFID function to be authenticated by web services.Alternatively, the NFC mentioning or RFID unit (808) may be in fact active reader or write device module, and this module is wired in the server below of secure border of door.In this case, this electronic installation will send encryption key by NFC or RFID, then this encryption key can be transferred to described server and compare with other form of authentication of mentioning (such as the authen session on consumer electronic device), to allow access door.
Another kind of form of authentication is by the geo-location on electronic installation (804), such as the GPS by this electronic installation or the definite location of similar satellite triangulation (809).Longitude and latitude data can be transferred to web services, and web services can compare these data and the preassigned longitude and latitude point of distributing to lock then.If the matching result of these points is (that is, within the scope of 50 feet of predetermined coordinate) within preassigned error range, suppose that user has passed through the authentication of lock, suppose that other the indispensable form of authentication has also all obtained confirmation.
If user's electronic installation is connected to or detects and locks near wireless (" Wi-Fi tMthe SSID(service set identifier of ") network (805)), this can by determine user in lock to set a distance in and as the authentication of another kind of form.And user's electronic installation can be directly connected to server (802), in the disabled situation of any web services, get around these web services, realized thus the authentication under " off line " state.
The authentication of another kind of form can be that request user takes static state or the dynamic Q R code (808) on (806) door side by their electronic installation.This QR code can be printed on passive or active NFC or RFID label or reader top, or it can be presented on display.The in the situation that of static QR code, suppose that user also authenticates by another kind of method, such as the session with web services, should identify so described lock and transmit an order for this lock.The in the situation that of dynamic Q R code, this code can be changed to unique code with preassigned time interval wheel, thereby confirms the time that user takes pictures and they are presented by specific QR code display, and thus as a kind of form of authentication.
Depend on the combination of the authentication method that lock management person requires, door (807) will, according to the success of those authentication attempts, allow terminal user to carry out manipulation.The example of its indefiniteness can be requirement user: by geo-location (804), confirm their position, the web services of accessing by the phone with them (800) has carried out authentication and successfully inputted their preassigned pin code (801) by cookie.
Fig. 9 illustrates a kind of like this sight: the people's request access that is not wherein authorized to be the user of lock.The upper unwarranted account of electronic installation (900) attempts to use the method (103 and 104) of introducing to read NFC/QR code (101) above.This device will be attempted to authenticate by web services, yet because this device is not authorized, so web services can this door of release.Application on device (901) receives the response from web services, and whether this user of this response indication haves no right to access this lock entity, and will point out this undelegated user to wish to the administrator request access right of lock.If 900 user selects " being ", the keeper of lock will receive a request of access on their electronic installation (100).This keeper can receive that this request user's profile information is as prompting, and according to circumstances this profile information is including, but not limited to name, photo, e-mail address or professional mechanism.This keeper can remote de-locking door and according to circumstances claimant is added to authorized user or refusal claimant access.
Fig. 9 has also introduced and can how this service class be similar to doorbell and use.When visitor is scanned label (101), owner can receive that described visitor is just in the notice (902) of request access.This is similar to visitor can ask to enter the situation of private residence in the ordinary course of things by pressing doorbell aloud, press doorbell aloud and can notify owner doorway to have visitor.Yet utilize this service, no matter owner is in any position, and needing only them has to the data connection of their electronic installation, will be notified.Extra benefit is that owner can remote de-locking door and record the time that visitor accesses by this services request.
Figure 10 illustrates and can how by simple message service (SMS) or text message service, to use this system.
Be invited to user to preassigned telephone number send with them, select in advance or allocate the text message to their pin code (1001) in advance.Together with this pin code, this user sends an order to web services, to change the state of lock, such as the order of release.
Cell phone provider receives text message (1000) and its content is transferred to web services together with the telephone number of this subscriber phone.The telephone number of web services inspection user and given pin code, to wish that for user the independent action that lock is carried out authenticates this user.
If web services success identity this user and decipher their order, it will be transferred to electronic lock (102) this signal, this electronic lock is carried out suitable order, such as locking or release.
Figure 11 introduces wireless key apparatus or key card (1102), it comprises unique identification digital signature, and the form that this digital signature can be controlled (MAC) address or equivalent alternative to, private key/private key to, unique sequence number, unique media interviews with the public/private keys of encrypting occurs.Web services (1100) is stored one or more elements (right half of PKI, private key/private key, sequence number) of this unique signature, is also storing together the data of indicating which signature which locking system of Internet access (1101) simultaneously.Web services (1100) is transferred to suitable locking system (1101) by the signature through authentication, directly pass on, or be that indirect means other communication means between web services and locking system of introducing by other places in mobile phone, electronics base station or present patent application is passed on.
When wireless key apparatus (1102) is given an order to locking system (1101), this locking system first by searching the unique signature being associated with this device (1102) in local storage, or by attempting communicating with web services before processing this request, whether the signature of checking this wireless key apparatus is authorized to be and sends the corresponding command.These orders can be limited to thinner granularity rank, such as other attribute of date, time, scheduling, degree of closeness, wireless signal strength or transmission between key device, locking system and/or web services (1100).All orders that wireless key apparatus (1102) sends can go on record and be stored on locking system and/or be transferred to web services.The not authorized order of locking system and the device of using will can not be performed, but sending of these orders can be transferred to the electronic installation that other has been authorized by web services, so knowing, the keeper of locking system having the wireless key apparatus of the use locking system that is not authorized attempting to use locking system.Keeper can make response by dynamically giving wireless key apparatus (1102) authority.
Except with locking system direct communication, wireless key apparatus can also be communicated by letter with middle device, this middle device can with locking system (1101), web services (1100) or direct communication each other, so that equivalent function, expanded scope to be provided, provide the proximity test of enhancing, the order that provides another Gong to select send mode or pass on and whether locked system status, device exist or environmental data is relevant additional information.
Figure 12 introduction be to comprise low-power and the wireless mobile device of high power (1200) simultaneously, this low-power and high power radio communicate by honeycomb, wired or wireless Internet Protocol, so as between web services (1201) and locking system (1202) transfer of data safely.
In the embodiment of an example, web services (1201) is used code, password or the secret of only having this web services to know with locking system (1202) set up the communication system of an encryption and select by mobile device (1200) route these communicate by letter (1200).Message can comprise unencrypted routing iinformation, only have the routing iinformation of the encryption that mobile device can decipher, and the enciphered data of only having locking system to decipher.Owing to sending to the data of locking system from web services (1201), it is enciphered data, so mobile device (1200) may not check these data, but still can use the additional routing iinformation that sends to this mobile device that described data are delivered to suitable locking system (1202).The enciphered data that sends to locking system (1202) can comprise locking, release or otherwise start the order of locking system, read the locked system status that comprises battery life order, at this, lock the order of authentication mobile device, the order that authenticates other device on locking system, the order of upgrading locking system firmware or the order of read access record data.The data that send to mobile device (1200) can comprise routing iinformation, the unique signed data of this routing iinformation including, but not limited to being associated with locking system (1202) and web services (1201).
In the embodiment of an example, with it, wired or high power radio comes to communicate with web services (1201) mobile device (1200), uses its low-power radio and locking system (1202) to communicate simultaneously.High power and low power communication channel can have can be by the additional password of the combination deciphering of initial, centre and/or end device.
In the embodiment of the example of introducing at Figure 13, when user's approach locking system (1300), they trigger infrared ray, sound, radio or a vibration transducer.The electric weight of this sensor consumption is far smaller than radio transmitting apparatus and web services (1301) communicates required electric weight by agreement, and described agreement can be including, but not limited to TCP(transmission control protocol)/IP (Internet Protocol)/UDP (User Datagram Protoco (UDP)), HTTP(HTML (Hypertext Markup Language)), HTTPS(hypertext transmission security agreement) and SSH(containment).This is then by the high power power consumption parts that almost the middle sensor of waken system (1300) is not using at once.
Once locking system (1300) is waken up and in receiving the state of order, it can change order or process from web services to web services (1301) solicited status and directly sends to its oneself queued command, such as sending to the Short Message Service order that will be transferred to locking system of web services.
High power radio device to web services (1301) requesting state information in portable electron device (1302) will receive the locked system status after now upgrading.Alternatively, high power radio device other compatible radio device in can hunting zone.
Approaching user can directly send locking, release or status request to the present wireless locking system (1300) that started, or by these requests of web services (1301) route, this web services is then transferred to locking system by these orders.This significant prolongation locking system (1300) battery life and saved bandwidth.
In Figure 14, mobile device (1400) can comprise a plurality of radio, especially those radio relevant with long haul communication such as honeycomb or satellite communication.Honeycomb or satellite that it can arrive web services by it connect the state that remotely sends order or request locking system (1401) to locking system (1401), and this web services can connect (1402) by another honeycomb or satellite subsequently these orders or request are transferred to locking system.
Locking system (1401) moves high power dedicated radio link discontinuously, to extend the life-span of any electronic storage device, depends on used power-saving technology, likely can be by the several orders of magnitude of described life.High power dedicated radio link can be including, but not limited to honeycomb or satellite communication.Locking system (1401) starts high power radio company and fetches the method that transmission state and request command use and can comprise the wireless degree of closeness that detects another kind of power, such as those radio that comprise in mobile device.
In the embodiment of the example of introducing in Figure 15, locking system (1500) can be recorded and knocked at the door or close the door event by increase vibration transducer.These data can be used for lock " to wake up " to high power state from low power state, thus it can with web services (1501) or mobile device (13402) direct communication, to indicate this knock at the door or vibrate.This sensor can be adjusted to and can distinguish dissimilar repeating motion, what these repeating motions should be indicated is to knock at the door, rather than closes the door or open the door.
Web services (1501) can be by any scope data-interface by data transfer to mobile device, with indicate someone on doorway, latching operation or close the door or open the door event.Web services can also be got back to this device on the opportunity of high power state by message transport by operative installations, last time locking or the unlock command sent such as this locality, and receive lock status information from locking system (1500).
Mobile device (13402) or web services (1501) can receive and the sequence of knocking at the door, latching operation or the relevant data of event of closing the door or open the door, and notify user.If the people who knocks at the door is known, described notice can also comprise with whom in the relevant data of knocking at the door, the unique signed data the MAC Address being associated such as the people institute Tape movement device as with knocking at the door or unique sequence of knocking at the door.
The disclosure comprises the multiple method that is used for detecting whether approach locking system of user.In the embodiment of various example, this can comprise and detect locking or unlocking operation, alarm or existence are connected to the device of the Internet, and can comprise to user and authorize the suitable access right to this locking system.The broad object of the feature based on approaching of locking system comprises: people detected and/or authorize the authority that they control some resource (no matter being electronic lock, the teakettle that for example connects the Internet (tea kettle) or certain other device), or control a device, or identify the user of device.The formulation of " locking system " is intended to comprise these devices.
Figure 16 has introduced by several different methods and has detected (locking system) (1601) that user exists.User can be awarded and use the web services that sends remote command to locking system, or for example points out the internal data store device whether this user is correctly authenticated on locking system, sends the ability for the series of orders of locking system (1601).
The current order that can send of authenticated may be bound, comprise the particular command that can send, can be from data and the possible constraint based on time and scheduling of system request.Locking system (1601) can detect user or personnel's existence, this locking system by the fact of this existence directly or indirectly transfer to and have the authenticated of suitably accessing the authority of locking system by portable electron device (1603) by locking system web services (1602), such as keeper.
User's detection can be undertaken by the specific wireless power technology on mobile device or electronic certificate (1600), this electronic certificate can directly communicate by letter with locking system (1601) or can by locking system (1601) user near time detect passively.Depend on user whether just in approach locking system still away from it, this system can send different notices to locking system web services (1602), and, in the embodiment of an example, send to directly or indirectly interested authenticated.Whether locking system (1601) can also approach the order of still sending out different away from locking system from movable contact according to user being detected, such as release when approaching or remove warning, or away from time locking and start warning.Similarly, the concept that electronic certificate based on user or mobile device (1600) are authorized user's access right can be extended to the device of any suitable startup, such as but be not limited to equipment, vehicle, electrical equipment, industrial system, security system, access control system, computing machine and other device.
Close user's set or voucher (1600) can receive the notice about their Internet access and so on any order on this device, as long as they are authenticated to be, are the users of Internet access.Can also exist by detecting someone by following technology, these technology are including, but not limited to the motion detection of specific sound, optical sensor, accelerometer and any appropriate format that passive or active IR sensor, radio signature detect, receive in motion on video camera, microphone.Depend on the complexity of any these sensors and the existence of electronic certificate, be similar to the mode of introducing above, can remind authenticated specific people's existence.
Enter and exist the mobile device (1600) of locking system (1601) near zone detecting can receive such notice: this notice is about the ability from this this system of device request access, to send order and receive order from this device to this device.If user has been awarded the authority of accessing this device by locking system web services (1602), they can send order and receive order from this device to this device immediately.
Depend on for detecting by locking system (1601) radio communication protocol whether mobile device (1600) exists, may need " pairing " to process and guarantee safety, the communication of encrypting.Although selected radio standard can provide diversified closed matching method, but open matching method still can be safely for mobile device and locking system are matched, although there is not physical contact between this mobile device and locking system.Open pair system can allow to approach the suitable mobile application of having of this system and wireless all mobile devices and the pairing of this system, yet, except depending on the initial pairing of the before shared signature of locking system and mobile device, got rid of the ability that sends and receive from this system any order to this system.These keys can be cancelled or issue to the web services that locking system connects (1602).
Alternatively, knocking at the door or knocking at the door continuously on closed pair system can be triggered the safety pairing between current device (1600) and locking system (1601), although even this device may be by the user outside secure border, carried and this locking system just occupied.If have keypad and pin input on locking system, can also input the pairing between mobile device (1600) and locking system (1601) with this keypad and pin so.
Figure 17 introduction be movement detection systems or radio detection locking system, mobile device (1703), the electronic certificate of this system by personnel or the infrared signature (1702) that detects body heat are carried out testing staff (1701).
Detecting device (1702) then by the message transport that detects event to web services (1704), this information comprise the available information relevant with these personnel be whether from they mobile device or electronic certificate obtain.This information can, by web services for multiple object, including, but not limited to triggering locking system, suitable user being enabled or remove warning system, or be notified third party to apply or serve so that it can carry out an action.
If the electronic certificate of detecting device (1702) access authentication or the radio signal of mobile device (1703), it can send one and carries out personnel from the infrared signature by them and detect the different signal of sent signal.This can realize in the infrared signature trigger alarm system for unknown, to the seamless forbidding warning system of authenticated.
To the restriction of authenticated and new user's authentication can be carried out by the web services by the Internet and communication detector (1704).Specific action by the complex detection device decipher such as passive infrared sensor or video camera also can be for authenticated.
Near being by HA Global Positioning Satellite (1801) or depending on by using other known radio signal to carry out to mobile device mobile device (1800) that other similar techniques of triangulation detect and appear at locking system (1802) of Figure 18 introduction.
Then, mobile device (1800) can be selected available nearest locking system (1802) automatically, thereby user can be when starting mobile device, and be likely in the application that is exclusively used in control locking system (1802) on starting mobile device (1800), to this locking system, send order immediately.
Mobile device (1800) can store with it how based on diversified method, to select the relevant information of locking system (1802).Mobile device receives the coordinate of locking system in the time of can authenticating the user of this mobile device registration or this mobile device.These coordinates can be determined by multiple means by locking device oneself, and these means are including, but not limited to GPS, Wi-Fi tM, cellular signal or IP address search.Alternatively, it is manually input trigger position of application that the locking system (1802) being associated with mobile device (1800) can be asked user.When this triggering can occur in order and sent to locking system for the first time, such as during its first registers or after the order that has sent some from ad-hoc location being detected.Location trigger coordinate can be stored locally on mobile device, and is sent in addition the locking system web services being associated, and this locking system web services then authenticates client by this data transfer to other, thereby they can avoid any initial setting up.
For the object of safety, the user who has authenticated can be restricted the position detecting based on them at them aspect the ability of locking system transmission order.The keeper of locking system may wish when the order of locking system is restricted to certain degree of closeness, under this degree of closeness, can determine that user has appeared near locking system, now according to accurately pointing out the ability of mobile device coordinate and the degree of be sure oing of these coordinates being introduced certain or do not introduced error range.Can obtain more accurate locating information with multiple positioning factor.
The preference that depends on locking system keeper, some locking system can be open to all users of the suitable mobile application of the execution within the certain degree of closeness scope in this locking system.This makes user can pass through locking system web services request access, to send to locking system or to receive order from locking system.
Locking system can exist the ability of setting up two-way communication between and mobile device own at it another agency as user.Locking system can dynamically arrange constraint condition for certain user, and these users' the mobile device of authentication must be connected to specific Wi-Fi tMnetwork, to carry out lock command.Can be by shared internal network or by the heterogeneous networks of setting up in advance for locking system, will be by such as Wi-Fi tMthe connection that such technology is carried out is directed to locking system.
Figure 19 introduction be the locking system (1901) being triggered by near the mobile device (1900) entering locking system.Mobile device can be determined by the several different methods of introducing above close to locking system.
Clearly interfere the mobile device (1900) that just can carry out the ability of application upper having without user, can from more rudimentary operating system, send the attention that notice causes user during near predefined " geographical fence (geo-fence) " user.In the embodiment of an example, geographical fence is the virtual boundary of real world geographic area.Geographical fence can be dynamically to generate, in this way round the scope in the certain radius of retail shop or some position.Or geographical fence can be predefined one group of border, is similar to limited access area territory or property boundaries.Also can user the geographical fence of definition.When the user's of position-based service (LBS) location aware device enters or exits geographical fence, this device can receive generated notice, this notice can be for starting special-purpose application, with operational lock system or otherwise generate an event.More rudimentary operating system can be specified this geography fence or the essential data transfer of geographical fence can be moved to application to specific locking system.Depend on the operating system that this is more rudimentary, locking system moves application can be had or not have directly and automatically send radio request with the ability of trigger command to locking system or to the web services being associated with this locking system.
More rudimentary operating system hinders or has eliminated in the situation of ability that mobile application sends wireless instructions therein, the notice of approach locking system can be transferred to user.Then, by this system, by preassigned action (under standardized), this notice being approved to be used to start locking system really moves application and triggers particular command.Depend on more rudimentary operating system and user preference, after mobile device being made to gesture or order, may need to adopt pin code or other acts of authentication to carry out fill order.
If user is correctly by authenticating and having locking exectorial suitable access rights, so when moving application according to the action launching of notification triggers, their order can be carried out immediately, and its reason is that more rudimentary operating system allows to have the access rights that directly or indirectly send wireless instructions to locking system.
Identical prerequisite (premise) can be for enabling and remove warning system.Can towards locking system, move or leave locking system according to whether user being detected, to locking system send for such as locking or release or enable or the system of sounding all clear the triggering of different command.More rudimentary operating system can process whether leave or enter the information that geographical fence is relevant to mobile device.The direction that depends on user be towards or away from locking system and the up-to-date authentication of knowing of user and Access status, the message that transfers to the user of mobile device with the form of notifying can be dynamic.
Locking system move application can be when being loaded according to notice by user immediate execution command.User can be directed to a control panel, and here they can send or receive other order from system to system.
Also mode that can be identical according to the mode with introducing above records and has been endowed the third party device of suitable function or electronic certificate close to locking system.These third party devices can be including, but not limited to possessing phone, computing machine, wrist-watch, panel computer, personal digital assistant and other electronic certificate of radio function.They can pass on approach locking system known or unknown subscriber existence and will be likely can be according to the mode identical with mobile device by authentication, to send order to locking system.The authentication of third party device can be derived from locking system web services.
Although the main operation of locking system can be relevant with Internet connection, thereby it can carry out alternately with the web services that authenticates and cancel access rights for suitable user, but it also can play a role with offline mode, thereby directly communicate with electronic certificate or mobile device.
The in the situation that of off-line operation, approaching mobile device or electronic certificate can be direct directly being authenticated in locking system in logic, and authenticated on the web services being associated.If disconnected with web services, locking system should still can authenticate and the order of the authenticated that receives to control oneself (their mobile device and electronic certificate).Do not rely on the real-time planning chart being connected, time restriction and other constraint condition of web services and should still can be observed by locking system.
The disclosure comprises for allowing the system and method for third party's system access locking system, sending and receiving order.In general this third party's system need to authenticate to authenticate the user (that is, keeper, the owner) of this third party's system by having enough large power.This authentication can at any time be cancelled or be limited.In addition, can directly authorize third party device by access right, such third party device can directly be connected to control it with locking system.This facility also can expand to safety/warning system.
Figure 20 discloses third party's service of the request that has triggered the available resources in access locking (or safety/detection) system (2004).Request from third party's (or send request) system (2000) can send from third party software, and it directly or indirectly derives from third party's web services.In general this request can comprise with locking system (2004) or authorized this system of access, be enough to directly or indirectly to the relevant information of the associated user of the access right of authorizing web services (2001) indication third party to require.From the indirect request of the web services of the request of sending, can derive from by third party's service and post web or the mobile application (2003) of carrying, or derive from the Another application that has been awarded the authority of making such request.
In the embodiment of an example, from the access resources of third party's system and the request of then controlling locking system (2004), need to the authenticated of the due authority of this locking system (2002), ratify by being awarded.Locking system web services (2001) can list the available command of the user's of depending on the request of sending authentication.If met correct authentication, just can authorize the authority of third party's system access system, these access rights can be bound or unrestricted in scope, including, but not limited to the constraint condition such as request time, request quantity, request frequency, request form and the order that can ask.
Once the authentication that has been third party's system made, the user then with third party's system of sufficient authentication can seamlessly send and receive data from locking system to locking system, such as locking or unlock command and locking system request.
Locking system web services can be undertaken alternately by standardized command set and third party's system, to notify in addition it, and then notify user's third party client the information relevant with the state of locking system, these information including, but not limited to such as cancelling, access right, off-line are reported to the police, door state and the such information of battery electric quantity.
Their access right may be because of many factors be cancelled in third party's service of authentication before, and access right or the system of cancelling them with user by through checking abused those relevant factors of (such as the too much order of quantity forwarded or attempt to distort order).Third party's service can be identified by many factors, including, but not limited to application key, IP address, MAC Address and user agent's character string.
Figure 21 shows another example embodiment that can Gong select, and wherein pre-authentication has been passed through in electronic certificate or wireless remote remote control (2102), can send and receive order from locking system (2104) to locking system (2104).Locking system web services and third party's web services (providing in the lump 2101) communicate with the electronic certificate reception from pre-authentication and the client third party's application (2103) that sends order to it." pre-authentication " is that indication locking system is based on being specific to the unique identifier of offline e voucher or the process that rolling token is carried out the order sending from this offline e voucher.
Third party's Client application can be based on such as being predefined in the room (seeing the screen in 2103) that the some time used the triggering of external event with the automatic request access authority of name of electronic certificate.Electronic certificate can disconnect and off-line completely with locking and third party's web services, and but, it still can send the order through authentication to locking system (2104), the unique identifier of this electronic certificate as long as this system has been told.Electronic identifier can be by user direct input or by the indirect input the near zone such as the system of entering, trigger the action with locking system, wherein near zone be electronic certificate can with the maximum magnitude of locking system success communication.
Electronic certificate can or carry the mobile phone of same unique radio signature including, but not limited to the Long-distance Control of simple key card style.Can apply such as region nearby and detect with fill order or from the same characteristic features user's direct command.The device of in addition, simulating the connection the Internet of simple off line electronic certificate can also pass on to be gone to or from the excessive data of locking system.
Figure 22 discloses the embodiment of another kind of example, wherein the user (2201) of new authentication by such as but be not limited to and inform that this user allows communication text message, Email, sending out notice or the third party's applicative notifications of pin code of its access locking system (2204) to carry out the message of their registration of confirmation of receipt.If carried out correct input on the keypad (not shown) on locking system, the authority that pin code can granted access several functions, including, but not limited to locking or release locking system (2204).Third party's application (2202) therein has been awarded to locking system (2204) and has sent in the situation of the authority of communicating by letter, the client of third party's system can process all communications of incoming terminal user, so that reception and registration and locking system and the relevant information of ability that order directly sent to this system.Sending out notice can be with context-sensitive, but in a kind of embodiment of example, web services sends sending out notice to portable electron device, notifies the state of this device locking system to change.Can also imagine, locking system for example, sends sending out notice while changing (have people with key manual unlocking door) at the state of this locking system.In the embodiment of an example, portable electron device sends a sending out notice to web services when the authorized user that is lock by user add.
Depend on the authentication that is transferred to third party's service, pin code can be transferred to third party's service from locking system service, thereby it can be conveyed to terminal user.Pin code can be configured with digital form.Can require user to input the pin code of user's special use together with the pin code of locking system special use.Alternatively, user can be awarded the pin code unique to each locking system, wherein uniqueness be angle from total key space of pin code, by the requirement of pin code length is determined.
When authorized user (2201) is input to pin code in the locking system (2204) of their authorized access at every turn, the input of pin code and any order sending can be transferred to locking system (2204) by web services (2202).If the user who gives an order (2203) removes or carries out a meeting by authorized user (2201) directly or indirectly and serves the action that authorized user is removed from locking system by third party from locking system, it is invalid that authorized user's pin will become.An example of this situation comprises cancels authorized user being scheduled to a space in special time.
The control panel assembly that Figure 23 introduction can be shown by third party's reservation service, this third party's reservation service is authenticated to be and represents that a user through authentication completely makes action to locking system.Under this scene, potential guest (2300) request is from providing the predetermined owner in space (2301) there a predetermined space.Third party's system can realize the inside story transmission (2302) between potential guest and owner.After agreeing to the schedule time, third party's system can, for this guest is from trend locking system request access power, be issued this guest at the access right of the time internal control lockmaking fixed system by predetermined appointment.
This third party's system can send the required information of access locking system from this guest of trend.Depend on this locking system, this can comprise pin code (as shown in 2301) or allow to arrange the link of locking system in mobile application.Alternatively, this third party's system can be asked an electronic certificate of locking system authentication, to be similar to the process of introducing above, accesses like that this system.
This third party's system can be controlled locking system to be directly incorporated in its control panel assembly (2303), and this control panel assembly allows guest change their unique pin code (if mandate) or send locking system order within this period and according to the plan of their license.
Third party device can with locking system direct interaction, as long as these third party devices have been awarded suitable unique identifier.Third party device and locking system direct communication, to send order.First this third party device generally can pass through pre-authentication, to send order in the identical mode of the mode with introducing to locking system above.This may mean, in locking system or locking system web services, unique identifier is used to be embodied as third party device grant access rights.
When the rolling token that is transferred to locking system, derivation when unique identifier is passed on or this device detected by the encryption approach signal from third party device, trigger locking system.Third party device sends to locking system constraint or the restriction that the ability of ordering can be subject to various planning chart and temporal constraint.Foundation sends to the order of locking system from locking system web services or third party's web services, the authentication of the use locking system of third party device can at any time be cancelled or reactivate.
When coming to communicate with locking system and locking system web services (configuring if so) with any third party's service or device, safety is all the problem of main consideration.May need communication channel between locking system web services and third party's web services in encrypted form, include but are not limited to: such as SSL, SSH, such standard or other the public or special-purpose encipherment scheme of AES.
Similarly, can to the direct communication between locking system and electronic certificate or third party device, be encrypted by various standard, such as combining, comprise bluetooth tM, bluetooth tMlow energy consumption, near-field communication, MiFare tM, Felica tM(Felicity card), Wi-Fi tM, WEP(wired equivalent privacy), WPA(Wi-Fi tMwPA PSK(wildcard) and those standards of other technologies protection access).MiFare is the trade mark of a series of chips of having of NXP semiconductor, is widely used in non-contact type smart card and contactless card closely.Customization encryption standard can according to circumstances substitute other encryption technology use or can be superimposed on increases extra safety on those technology.
Figure 24 introduction be web services control panel (2400), what this control panel was passed on is the ability that leading subscriber has: to locking system, send and receive order and invite other user to add this system (2403), check the data any buffer memory or real-time relevant with locking system or its state and identify the active user (2402) this system and the behavior that they do locking system from locking system.This control panel can obtain with the various forms for different application adjustment, including, but not limited to traditional desktop browsers interface, mobile phone interface, dull and stereotyped telephony interface or third party's interface.Depend on the authority of authorizing the user who checks this control panel, different information can be conveyed to this user.For example, certain user can be in the ability of access right that creates, changes, manages and cancel other users and is checked in the ability of log information and change to some extent.
Web services control panel (2400) can allow user to input can be as the extra identifying information of authentication token, this extra identifying information can have following form: the pin code of directly inputting on door, for sending text message to preassigned telephone number sending the pin code of order to door, for the pin code of arbitrary object, or any other sequence number or the secret token information relevant to offline e voucher such as key card or key card.
Can comprise identifier with other user-dependent information (wherein user is the agency of personage in system) (2402), such as but be not limited to individual photo, individual name, another name, e-mail address, telephone number, the state of web services, the state of locking system, associated rights.Other users being sent, changed or cancel the ability of virtual voucher also can be shown or be managed by this system.
New virtual voucher can send (2403) by various communication protocol, including, but not limited to Email, phone, text message transmission, application interface or third party's message, transmits.These vouchers can be authorized for different when and where scopes, including, but not limited to period planning table, beginning and closing time, the specified place of being determined by geodata, carry out definite specified place by powering up or do not power up radio by degree of closeness, one or many is used separately, and may require the people who is awarded these vouchers to use polytype authentication.The field of inputting virtual voucher can automatic filling identifier, such as but be not limited to the name that is registered to the user in this system or comes from the associated user of another third party's system, Email, photo, another name and or telephone number because send user type and letter and the identifier Dynamic Matching of invitation in field.Can be according to circumstances by this field extension for to input a plurality of identifiers for various people, to invite a plurality of users with same type voucher simultaneously, or according to circumstances invite the user of the type of credentials changing according to the algorithm (being increasing or decreasing) of asking.
Figure 25 discloses the log panel of being checked by web, mobile phone, panel computer or other browser interface by the user through authentication.The web services being associated with locking system can record a series of information, comprise and information-related and relevant with the physical change of the locking system information sending to locking system and receive from locking system, the information relevant with the unauthenticated user who attempts to access locking system, the information relevant with the event that is specific to web services itself, or with relate to web services or locking system or on web services or locking system through the relevant information of third party's web services of authenticating.
The action that user carries out can be pass on together with following message (2500), these information such as but be not limited to the date and time of name, another name, access, when the trial of the locking system that conducts interviews virtual key whether effectively, the action of expectation, come self-moving device, radio token, keypad, web interface, application interface or the result of third party's application and the method for using with degree of closeness, network site and type, geographical location information, the judgement virtual key of position.
By any data relevant to locking system of locking system or relevant web services or the two record, can be passed on out map (2501) is upper, this map can indicate the position of locking system or to locking system or web services sends or the position of any data transmission of receiving from locking system or web services.Whether this can approach this locking system by indicating user when locking system sends order.If the user who has authenticated has the suitable access rights to a plurality of locking systems, their coordinate all can be labeled on single map so.
Web services can be passed on the figure (23402) of the frequency of time dependent lock event on indication particular lock fixed system.User can have the ability of filtering following event, these events including, but not limited to time dependent unique user move, the action of time dependent particular type (, May in 2011 unlock events on the 1st number of times), the contrast of time dependent all kinds of journal entries (that is, from afternoon on April 1st, 2011 12:00 to afternoon May 1 1:00 the number of times of the lock event of carrying out self-moving device and the contrast of the number of times of lock event from locking system keypad).
The event recording can comprise the geographical position coordinates information that the source position of this order while sending order with user is relevant.This information can the geographical position coordinates information (2503) request directly be inferred and draw or can indirectly infer by IP address search technology from direct coding.Mobile client, web client computer, third party's client computer, fixedly keypad and reader may be required geographical location information to send to web services, so that successful execution order.
Figure 26 discloses the embodiment of the example that a kind of initial setting up that can make locking system simplified, thereby new user can be connected to locking system rapidly corresponding web services or the electronic installation of locking system and their compatibilities (such as mobile device, board device, laptop computer, desk-top computer, personal digital assistant or third party device) is directly matched.
The upper use of mobile device (2600) application corresponding with this locking system in the web services with being associated (2602) and the two communication of locking system (2601), makes it can authorize the initial pairing between new user and locking system.This initial pairing may be from some identifying information of new user, to they are authenticated for locking system, such as but be not limited to their name, another name, e-mail address, telephone number and photo.During initial registration, automatically send to other identifying information of web services can be including, but not limited to geographical location information, IP address information, cellular network information (if available words) and the relevant information of mobile device to moving application.
Locking system can be directly connected to mobile device (2600) via the common interface such as audio frequency or universal serial bus connection by wired connection (2601).Locking system will receive the program command from this mobile device, including, but not limited to about how to be connected to the instruction of web services and to be connected to local or the required any authenticate key of pairing of Wide Area Network or establishment and mobile device itself.
Pairing is processed completes and can stop other mobile device to carry out identical pairing to process, this pairing process be by the logic on locking system directly indication or on relevant web services, indicate.Initial user can allow other mobile device request and locking system matches and the help of web services can be recorded or obtain by web services to these requests.Can use the physical interface on locking system, such as keypad, button and other sensor, reset locking system, to can freely it be associated with mobile device.These interfaces can require to input particular code or the pattern of scale-of-two input, to this device is re-set as to new pairing mode.First the information relevant to any resetting event can be conveyed to relevant web services and can be triggered notice or other event on web services.
Figure 27 discloses direct connection the between mobile device (2701) and locking system (2702) in the embodiment of an example, mobile device (2701) can comprise sending and receiving ability with locking system (2702) simultaneously, thereby the application moving on these two devices can be passed on a series of programming, state and command information.This connection can show as audio frequency, sound or the microphone jack of various different sizes, such as those jacks general on mobile device.This connection can for the purposes of initial setting up and by locking system and available mobile device and network match, to locking system programme, reset locking system, to locking system, send order and from locking system accepting state.These can comprise that for initial safe to wireless network, connecting is WAN(wide area network), LAN(LAN (Local Area Network)) or the instruction of ad-hoc.These data can send in the mode of encrypting or do not encrypt.
Be initially connected with locking system or programmed events after, it can bind it by unique identifier itself with mobile device, thereby other device all can not be accessed identical programing function, unless first clearly authorized license by the application on original programming mobile device or web services.
Figure 28 discloses by drawing the magnitude of current of (draw) or it draws the locking system of the capabilities limits of electric current in time continuously on any single time point.This may be because locking system draws energy and intends battery through just using up for a long time from battery, or because it is by energy acquisition or the power supply of trick charge components of system as directed.
For the energy of locking system, can be to be stored by the energy storage technologies (2800) of any type that meets the physical constraint condition of locking system, its various batteries including, but not limited to capacitive means, different chemical character or mechanical energy memory storage.The proper circuit relevant to energy storage technologies can be guaranteed before the remainder of locking system is stored or utilized, and the hurtful erratic current of possibility and voltage are remained in safe level.
The energy of locking system can be from can through magnetic field rotate and generate electric current locking system inside stubborn hand (2801) or round the rotation of the similar locking system leverage points (2804) that fixedly lock shaft rotates, generate and catch.And any amount of machinery between locking system can be used to catch energy alternately, this energy then can be used to locking system or be stored in energy storage technologies (2800).These also comprise from vibration (2802) for locking system obtains energy, this vibration can cause from closing or open the parts relevant to locking system.The energy of locking system can be also to catch energy conversion device (2803) and generate and catch from being placed on the inner or outside photovoltaic of this device or other light.
Figure 29 discloses locking system (2902) in the embodiment of an example and has reduced its power consumption to extend battery or several different methods that stored energy is used duration to adopt.These methods comprise the intrinsic logic of locking system (2900), on this logic those time points that only locking system may be used in a day, start locking system power consumption maximum aspect.
This logic can be counted as considers to use in the middle of one day locking system (2902) the most constantly or use in the past in the process of locking system in the middle of one day algorithm (2900) the most constantly.When calculating, by event, to send to the possibility of locking system be negligible or while being zero, and can the stop using parts of power consumption maximum of this logic, such as radio, microcontroller, power governor and other parts.Because locking system is according to using record access data and delivering in this algorithm these data as parameter, so this algorithm table that can change one's plans.When this system is revived termly according to the definite planning chart of this algorithm, whether it can check locking, release or the status command sending from web services, and likely from close to door or keep off mobile device, another third party's web services, application interface, web interface or the text message interface order of sending of door.
Mobile device (2901) can generate some radio signature that can be detected by the special-purpose low consumption circuit on locking system (2902).The example of this radio signature comprises from GSM tM(global system for mobile communications), CDMA(CDMA), Wi-Fi tM, bluetooth tMor the differentiable signature of other radiotelegraphy that conventionally can obtain on mobile device.Low consumption circuit be not for mobile device on radio direct communication, on the contrary, be only used for detecting their existence, to power up for consuming the more additional components of multiple current when the energising, such as microcontroller, radio and power governor.So user can directly or by web services indirectly successfully send or successfully receive data from locking system to locking system, and locking system only need to consume a large amount of electric power having detected when mobile device approaches this locking system.
In locking system (2902), the low-down assembly of other power consumption can be for the existence to this system alert user, thereby other high power consumption components can be activated in due course.The low-down parts of power consumption can involving vibrations sensor, passive infrared sensor, microphone or sensor outside locking system, that communicate by letter with locking system by the low-down radio unit of power when high power radio unit remains in deep sleep or power-down mode.
Figure 30 discloses when still keeping original access control structure constant, is modified the locking system that uses and control by web services for being suitable for mobile device.This locking system depends on the access control technology of conventionally knowing and understanding, this access control technology consists of computer control (3003), computer control (3003) is when the electronic certificate reader (3001) connecting scans passive radio voucher (3000), and whether can locking, release, open or unlock or warning system (3002) if managing this passive radio voucher (3000).
Can be transformed traditional access control system, so that with replacing or augment existing electronic certificate reader with the microcomputer of mobile device or web services direct communication.Augment or replace reading device (3001) and can from data connect, detect or read the information from passive electronic voucher.This data signature can send in the mode of encrypting or not encrypting, the same with the situation of standard such as normally used Wiegand technology.If encrypted, this device can be deciphered related data with common disclosure or known private key.This device can be carried out the action of these data of resetting, so that simulation passive radio voucher.The simulation of this voucher should be seamless for the remainder of locking system, to original computer control (3003), should be especially more seamless.
Use together with mobile device (3005) and the web services (3004) that is associated, the user who has had for the radio token of original service can provide to the reader device of newly augmenting or replacing (3001) their token, thereby their voucher and their user account are matched.Once be paired, the user of mobile device can send order by the application on this mobile device, and such as locking or release, this application then can directly be transferred to this order the reading device of augmenting or indirectly pass on by relevant web services.The reading device of augmenting can be reset the radio token data being associated to original locking system controller, and the user who simulates hand-held original radio token has approached reader.
Once be paired, user just can or should be used for sending order through the third party who authenticates by mobile interface, web interface, text message interface.All these orders finally all can be carried out according to original access control computer system (3003), other ability that makes computer control can keep identical programming, record and use radio token to bring.If computer control will be refused simulation token out, can this situation be transferred to web services or mobile subscriber by several different methods.
By retaining existing framework, can, when the maintenance all programmings relevant to original calculation machine controller are constant, new web services and mobile available framework easily and be rapidly installed.In addition, web services (3004) can with computer control (3003) direct communication, to get around the necessity of augmenting reader components (3001).It is principal character that the reader components of augmenting can be take the proximity test technology of any series, comprises and resembles bluetooth tM, Wi-Fi tMor those radio of the such conventional mobile device radio direct communication of near-field communication.
Method embodiment
Some embodiment of theme of the present invention comprises the method that operation can remote-operated lock.
A kind of such embodiment has been shown in Figure 31-31G.In the embodiment of the example shown in Figure 31, the method that operation can remote-operated lock comprises: 3100, receive the voucher from portable electron device at web services place; 3102, this voucher is authenticated; With 3104, based on successful authentication, from web services, send the order of being received by interlocking.
In Figure 31, the method can further comprise at 3122 places reception and the authentication based on voucher, notify user immediate geographically close exercisable lock for this device, this is within geographically close operable locks is positioned at the distance determined of this device.The method can also be included in 3124 places and the approaching lock of this device be detected.
In Figure 31, the method that operation can remote-operated lock can also comprise, at 3152 places, the lock server that use is communicated by letter with web services or portable electron device, controls lock in response to the order of being sent by web services or portable electron device.In Figure 31, the method can also comprise, at 3166 places, in response to described order, using can remote-operated lock and notify user should lock successfully actuating.
In Figure 31, the method can also comprise, at 3190 places, provides and phase-locked associated video camera, is used for taking the people's attempt to operate this lock photo.3192, the method can also comprise and is provided for detecting lock or with the vibration transducer of the vibration of this phase-locked associated door and receive the signal that at least derives from this vibration transducer.
In Figure 31, the method can also comprise, at 3102A place, for user provides the online account on a web services.In Figure 31 G, the method can also comprise, at 3104A place, provides one for the voucher that will be received by interlocking by user's input or the entrance of order on web services.
In Figure 31 A, the voucher receiving at web services place from portable electron device 3100 can be included in 3106 places' reception device voucher relevant to portable electron device.At 3108 places, this device voucher can comprise at least one device voucher element of selecting from following one group, comprising: the gps coordinate of setting position, Wi-Fi tMiD, bluetooth tMiD, telephone number, SMS address, and pin code.3110, these device vouchers can be buffered in this device.At web services place, receive the lock voucher that can be included in the reception of 3112 places and phase-locked pass from the voucher of portable electron device.At 3114 places, lock voucher can comprise at least one lock voucher element of selecting from following one group, comprising: the gps coordinate of lock or with this phase-locked associated identification label, Wi-Fi tMiD, bluetooth tMiD, near-field communication checking, the input of pin code, the operation of response (QR) code identification, and time lock fast.3116, at least some lock vouchers can be buffered in portable electron device.3118, the lock voucher of buffer memory can be realized by this device these vouchers are authorized at least partly.In Figure 31 B, authenticate these vouchers 3102 and can be included in 3120 places and by web services, carried out at least some authentication of these vouchers.
In Figure 31 A, the method can also comprise, at 3198 places, with the form of text (SMS) message, from portable electron device, receives these vouchers.In Figure 31 C, the method can also comprise, at 3100A place, from user's portable electron device, receives the order of text (SMS) form of message and the order that makes to be received by the interlocking order based on text form.
In Figure 31 A, the method can also comprise, at 3106A place, allows web services can use the one or more connection elements in following a group to communicate by letter with portable electron device, comprising: Wi-Fi tMiD, 3G/4G, EDGE(GSM strengthen data transfer rate evolution), SMS(short message service), and Ethernet.In Fig. 1, the method can also comprise, at 3108A place, the trial of operable lock or request is notified to user.In Figure 31 B, the method can also comprise, at 3110A place, in response to this, notifies to authenticate the voucher receiving from user, and receives order from user with actuation lock.
In Figure 31 B, 3176, these vouchers can comprise the unique code being associated with the user of portable electron device.3178, another user-association of another unique code and lock can be got up.3180, authenticate these vouchers and can comprise the one or more elements in using following a group, comprising: gps coordinate, Wi-Fi detected tMnetwork, near-field communication checking, the input of pin code; Response (QR) code identification fast, and regularly input.
In Figure 31 C, 3168, the input from user that the orders that received by lock 3104 that web services sends can be based on receiving at portable electron device place.3170, the order of being received by interlocking that web services sends can be used and be arranged on the input that the software application on portable electron device provides based on user.3172, order is one of order of selecting from Management Information Base, and this group command comprises: locking, release, timely lock request, definite time limit release request; With the request of switching locking/unlocking.3174, this order can be associated with the latching operation scheme of customization.
In Figure 31 C, the method can also comprise, at 3182 places, can in remote-operated lock, be provided for and Wi-Fi tMthe Wi-Fi that network connects tMchip, and at least pass through Wi-Fi tMnetwork sends the order of being received by interlocking.3184, can be for providing bluetooth by remote-operated lock tMconnect, and at least pass through bluetooth tMconnect and send the order that will be received by interlocking.3186, the method can also allow lock and the portable electron device pairing that can use web, and at least by by sending the order that will be received by interlocking with the Internet connection that the portable electron device of web is set up.3188, the method can also comprise at least to receive voucher or user command from portable electron device by Internet connection.
In Figure 31 D, the approaching lock 3124 of device being detected can comprise, at 3126 places, use one or more in the element in following a group, comprising: read be positioned at lock proximity and with this phase-locked associated label, the gps coordinate of lock, the gps coordinate of device, detect Wi-Fi tMor bluetooth tMnetwork, near-field communication checking, the input of pin code, the operation of response (QR) code identification, and time lock fast.3128, pick-up unit approach lock can comprise by least one voucher element of buffer memory in this device with by the identification of this device or the corresponding voucher that receives, compared.3130, device detected and approach lock and can start the software application on this device.3132, the method also comprises the lock software application that is provided for installing on portable electron device, be associated with web services.3134, this software application will approach lock and automatically start in response to this device being detected.3136, this software application also will when starting, this device be approached to lock and voucher is notified to web services.
In Figure 31 D, device detected and approach lock 3124 and can comprise, at 3138 places, provide be positioned at lock proximity and with this phase-locked associated label.3140, the method can also comprise that reception shows the signal that this label has been read by portable electron device.3142, this label can be near-field communication (NFC) label.3144, this label can be encoded with software application unified resource designator (URI).3146, the automatic startup of software application comprises the unified resource designator (URI) of encoding in portable electron device identification label.3148, this label can be encoded with unique code, and this unique code forms at least a portion of voucher.3150, these vouchers can be authenticated with this unique code at least by web services.
In Figure 31 E, make to lock server and web services is passable in communications status, 3154, realize the two-way communication between lock server and web services.3156, the method can also comprise that the wireless remote unit using with lock server communication sends order to lock.3158, the method can also comprise that the relay and control circuit using with lock server communication sends order to lock.3160, the method can also comprise that user's Internet service makes door lock server or lock and web services in communications status.3162, the method can also comprise the not state in communicating by letter with web services of notice Subscriber Application Barring Lock server.3164, the notice Subscriber Application Barring Lock server not state in communicating by letter with web services can be in response to interlocking and receives and order unsuccessfully and occur.
In Figure 31 F, the method can also comprise, at 3194 places, the signal of the received vibration transducer that derives from detecting gate or lock vibration is notified to user.3196, detect vibration can comprise detect user lock or with specific knocking on this phase-locked associated door, this specific part that forms voucher of knocking.
The embodiment of another kind of exemplary method has been shown in Figure 32-32G.
In the example embodiment shown in Figure 32, the method that operation can remote-operated lock comprises: 3200, authenticate the voucher receiving from portable electron device at web services place; 3202, portable electron device detected and approach lock; With 3204, from web services or portable electron device, send the order that will be received by interlocking.
In Figure 32, the method can also comprise, at 3232 places, the geographic position based on user, notifies user's lock that a choosing operates or nearest operable locks.The method can also comprise, at 3238 places, is provided for application programming interface (API) that third party software and web services are combined, so that the portable electron device being associated can operable lock or communicated by letter with web services.
In Figure 32, the method can also comprise, at 3262 places, makes can be connected to Wi-Fi by remote-operated lock tMnetwork, RF or radio net or bluetooth tMdevice, and at least by this Wi-Fi tM, RF or radio net or bluetooth tMdevice sends the order that will be received by interlocking.3264, the method can also comprise and allow lock and the portable electron device pairing that can use web, and at least by by sending the order that will be received by interlocking with the Internet connection that the portable electron device of web is set up.
In Figure 32, the method can also comprise, at 3268 places, provides and phase-locked associated appurtenances, and these parts, for combining with lock, web services or user or communicating with lock, web services or user, help operate this lock to have at least.In Figure 32, the method can also comprise, at 3280 places, in response to described order, using can remote-operated lock and notify the successful actuating of this lock of user.The method can also comprise, at 3290 places, the second user is notified to first user the trial of operable lock or request.3292, the method can also be included as user the online account on a web services is provided.
At Figure 32 A(i) in, authenticating received voucher 3200 can comprise, at 3206 places, and the initial authentication of portable electron device, this initial authentication makes portable electron device and to send the direct command that will be received by this interlocking with lock direct communication.3208, at least some vouchers can be buffered in portable electron device.3210, the voucher of institute's buffer memory can be realized by this device these vouchers are authorized at least partly.3212, the authentication of the residue of voucher can be carried out by web services.3214, these vouchers can comprise at least one in the element in following a group, comprising: gps coordinate, Wi-Fi detected tMnetwork, near-field communication checking, the input of pin code, response (QR) code identification fast, and regularly input.3216, received voucher can comprise the device voucher relevant with portable electron device.At 3218 places, received device voucher can comprise at least one the device voucher element choosing from following a group, comprising: the gps coordinate of setting position, Wi-Fi tMiD, bluetooth tMiD, telephone number, SMS address, and pin code.3220, received voucher can comprise the lock voucher with phase-locked pass.3222, lock voucher can comprise at least one lock voucher element of selecting from following one group, comprising: the gps coordinate of lock or with this phase-locked associated identification label, Wi-Fi tMiD, bluetooth tMiD, near-field communication checking, the input of pin code, response (QR) code identification fast; Operate with time lock.
At Figure 32 A(ii) in, 3284, these vouchers can comprise the unique code being associated with the user of portable electron device.3286, the method can also comprise sends another unique code being associated with another user who locks.3288, the method can also comprise that the form with text (SMS) message receives these vouchers from portable electron device.
In Figure 31 B (i), the approaching lock 3202 of device being detected can comprise, at 3224 places, use one or more in the element in following a group, comprising: read be positioned at lock proximity and with the gps coordinate of this phase-locked associated label, lock or device, Wi-Fi detected tMor bluetooth tMnetwork, near-field communication checking, the input of pin code, the identification of response (QR) code and time lock operation fast.3226, detect device approach lock comprise by least one voucher element of buffer memory in this device with by this device at least one corresponding voucher that identify or that receive compare.3228, device detected and approach lock and also comprise the sign of notifying Subscriber Application Barring Lock.3230, the sign of notice Subscriber Application Barring Lock is reception and the authentication of the voucher based on received.
In Figure 32 B (ii), at 3234 places, device detected and approach the software application that lock 3202 is automatically enabled in the upper installation of this device.3236, this software application can be that third party applies.3240, the input of using the user of the software application of installation on this device that comes from that the order that will be received by interlocking that web services sends can be based on receiving on portable electron device.3242, the order of sending can be one of order of selecting from Management Information Base, and this group command comprises: locking, release, timely lock request, definite time limit release request, and switch locking/unlocking request.3244, this software application can be for the lock software application of installing on portable electron device, being associated with web services.3246, this software application also for notifying voucher to web services when starting.
In Figure 32 B (iii), device detected and approach lock 3202 and can comprise, at 3248 places, provide be positioned at lock proximity and with this phase-locked associated label, this label will be read by portable electron device, to start described application.3250, the method can also comprise that reception shows the signal that this label has been read by portable electron device.3252, this label can be near-field communication (NFC) label.3254, this label can be encoded with software application unified resource designator (URI).3256, the startup of software application comprises the unified resource designator (URI) of encoding in portable electron device identification label.3258, this label can be encoded with unique code, and this unique code forms at least a portion of voucher.3260, these vouchers can be authenticated with this unique code at least by web services.
In Figure 32 C, at 3282 places, 3204 orders that are associated of latching operation that can comprise with customization of giving an order.The method can also comprise, at 3296 places, from user's portable electron device, receives the order of text (SMS) form of message and the order that makes to be received by the interlocking order based on text form.
In Figure 32 D, allow pairing 3264 to comprise in addition, at 3266 places, at least by Internet connection from or to portable electron device, receive or send voucher or user command.
In Figure 32 E, 3270, these appurtenances can be the parts that choose from following group, comprising: lock power supply unit, latching operation parts, lock server, link, pin or order input small keyboard, Existing detector, vibration transducer, doormat, doorbell and video or still camera.3272, link can be the parts that choose from following parts group, comprising: bluetooth tM, radio frequency (RF), Wi-Fi tM, the Internet, infrared ray and piezoelectricity.3274, appurtenances can have passive and active state, and portable electron device wherein detected and approach lock and can trigger appurtenances and enter its active state, or make this parts executable operations.3276, portable electron device detected and approach lock and can comprise and notify these appurtenances of user do not combine or communicate with lock or web services.3278, notify these parts of user not combine with lock or web services or communicate to be in response to interlocking and to receive and order unsuccessfully and occur.
In Figure 32 F, the method can also comprise, at 3294 places, in response to this, notifies to authenticate the voucher receiving from first user there, and reception is carried out with actuation lock from the order of first user.
In Figure 32 G, the method can also comprise, at 3298 places, provides an entrance on web services, voucher or the order that for user's input, will be received by interlocking.
The embodiment of another kind of exemplary method has been shown in Figure 33-33C.
In the example embodiment shown in Figure 33, the method that operation can remote-operated lock comprises: 3300, be provided for receiving from the portable electron device of software application is installed the first web services of voucher or order; 3302, from this web services, send the order that will be received by interlocking; With 3204, on the first web services, be provided for application programming interface (API) that the second web services or described software application and the first web services are combined, so that portable electron device can be communicated by letter with lock or web services.
In Figure 33 A, the received voucher relevant with third party user or the second web services can be authenticated by the authenticated of locking at 3322 places.3324, third party or the second web services can seamlessly be given an order or seamlessly from interlocking, receive data to lock.
In Figure 33 A, the method can also comprise, at 3310 places, the voucher receiving on web services is authenticated, and based on successful authentication, sends the order that will be received by interlocking.3312, received voucher can with phase-locked pass.3314, received voucher can be relevant to portable electron device.3316, the voucher receiving can be relevant to third party user or second web services of request access the first web services or lock.
In Figure 33 B, the order that be received by interlocking can receive by locking by the second web services at 3330 places.
In Figure 33 C, at 3306 places, this software application can be third party software application.3308, in response to coming from access the first web services of user or the request of lock, carry out combination.
In Figure 33 C, at 3318 places, the order that be received by interlocking can be received by the second web services by lock.3320, in response to coming from access first web services of unauthenticated user or the request of lock, carry out combination.
In Figure 33 C, third party is applied in the generation of 3326 places based on external event with user's the automatic request access lock of name.3328, external event can be the event of selecting from following group, comprising: be predefined in room, the request used sometime and enter safe house, send parcel, check house, enter in automobile, and use bicycle.
The embodiment of these methods is in this article also referred to as " example ".These examples can comprise other method element except the method element that those are shown or introduce.But, the present inventor has also imagined only provides those examples shown or the method element introduced.And, for specific example (or its one or more aspects), or for shown or other the example (or its one or more aspects) introduced herein, the present inventor has also imagined and has used shown before those or any combination of method element that introduce or the example of displacement.
The realization of processor
The various operation of the exemplary method of introducing herein can be become or forever be configured to carry out one or more processors execution of associative operation at least in part by temporary transient configuration (for example,, by software).No matter be temporary transient or permanent configuration, these processors can form the module realizing with processor that one or more operations or function are carried out in operation.The module mentioned herein can comprise the module realizing with processor in some example embodiment.
Similarly, the method for introducing herein can be with processor, to realize at least partly.For example, at least some operation of method can be to carry out by one or more processors or by the module that processor is realized.The execution of some operation can be distributed in one or more processors and complete, and is not only to reside in individual machine, but disposes at a plurality of machinery compartments.In the embodiment of some example, one or more processors can be placed in single position (for example,, in home environment, office environment, or as server zone), and in some other embodiment, processor can be distributed on a plurality of positions.
One or more processors also can be supported in carries out the operation of associative operation or with " software serve " formal operations (SaaS) in " cloud computing " environment.For example, at least some operation can be carried out by one group of computing machine (as the example that comprises the machine of processor), and these operations are can pass through network (for example, the Internet) and pass through one or more suitable interfaces (for example, API) and addressable.
Electronic equipment and system
The embodiment of example can be realized in Fundamental Digital Circuit, or realizes in computer hardware, firmware or software, or realizes in their combination.The embodiment of example by data processing equipment (for example can be used, programmable processor, computing machine or a plurality of computing machine) operation that carry out or that control data processing equipment computer program (for example, the actual computer program embodying in information carrier, for example, in machine readable media, embody) realization.
Computer program can be write with any type of programming language, comprise compiling or interpretative code, and it can be deployed any form, comprise other unit that is deployed as stand-alone program or is deployed as module, subroutine or is suitable for using in computing environment.Computer program can be deployed as on a computing machine to be carried out or in the three unities or be distributed on a plurality of places and by communication network and carry out on interconnective a plurality of computing machines.
In the exemplary embodiment, can carry out executable operations by one or more programmable processors of computer program, this computer program is used for carrying out function by input data are operated and generate output.Method operation also can for example, be carried out by special-purpose logical circuit (, FPGA or ASIC), and the equipment of the embodiment of example can be realized with the form of dedicated logic circuit.
Computing system can comprise client-server.It is mutual each other that client-server is passed through communication network conventionally away from each other and in general.The relation of client-server is to occur due to operation on corresponding computing machine and the computer program each other with client-server relation.In disposing the embodiment of programmable computer system, these two all needs to consider conventionally to it will be appreciated that hardware and software framework.Specifically, should recognize, at the permanent hardware configuring (for example, ASIC) in, at the hardware of temporary transient configuration (for example, the combination of software and programmable processor) in, still in the combination of permanent configuration and the temporary transient hardware configuring, realizing the selection of some function, may be a design alternative.Provide hardware (for example, machine) and the software architecture that can in various example embodiment, dispose below.
The machine architecture of example and machine readable media
Figure 34 be take the block diagram of the machine that computer system 3400 is exemplary form, and this computer system 3400 is interior can be carried out for causing machine to carry out the instruction of any one or more methods of introducing herein.In the embodiment that can Gong select at some other, this machine operates as autonomous device or can be connected (for example, by network, connecting) to another machine.In the deployment connecting by network, this machine can be used as server or the client machine operation in server-client network environment, or as the node machine operation in equity (or distributed) network environment.This machine can be any machine of personal computer (PC), dull and stereotyped PC, Set Top Box (STB), PDA, cell phone, web equipment, network router, switch or bridge or can the carry out instruction of specifying the action taked by machine (orderly or otherwise).In addition,, when only individual machine being shown, term " machine " also should be believed to comprise carries out one group of (or many groups) instruction alone or in combination to carry out any collection of machines of any one or more methods of introducing herein.
The computer system 3400 of example for example comprises the processor 3402(that communicates with one another by bus 3408, CPU (central processing unit) (CPU), Graphics Processing Unit (GPU) or the two), primary memory 3404 and static memory 3406.Computer system 500 for example can also comprise video display unit 3410(, liquid crystal display (LCD) or cathode ray tube (CRT)).Computer system 500 for example also comprises alphanumeric input device 3412(, keyboard), user interface (UI) navigation or cursor control device 3414(are for example, mouse), disk drive unit 3416, signal generating apparatus 3418(for example, loudspeaker) and Network Interface Unit 3420.
Machine readable media
Disk drive unit 3416 comprises machine readable media 3422, on this machine readable media 3422, by one or more groups data structure of any one or more methods of introducing or function specific implementation or utilization and instruction 3424(is for example storing software herein).Instruction 3424 can also reside in completely or at least in part in primary memory 3404 and/or in processor 3402 by computer system 500 term of execution, and primary memory 3404 and processor 3402 also form machine readable media simultaneously.
Although the machine readable media 3422 is in the exemplary embodiment single media, but term " machine readable media " (for example can comprise the single medium of storage described one or more data structures or instruction 3424 or a plurality of medium, centralized or distributed data base, and/or the high-speed cache being associated and server).Term " machine readable media " can also be understood to include can store, encode or carry by machine, carried out and cause machine to carry out the instruction of any one or more methods of embodiment of the present invention, or can store, encode or carry by these instructions and utilize or any tangible medium of the data structure that is associated with these instructions.Term " machine readable media " should be understood to include thus, but is not limited to, solid-state storer and optics and magnetic medium.The object lesson of machine readable media comprises nonvolatile memory, comprises for instance semiconductor storage (for example, Erasable Programmable Read Only Memory EPROM (EPROM), Electrically Erasable Read Only Memory (EEPROM) and flash memory device); Disk, such as internal hard drive and can plug dish, magneto-optic disk and CD-ROM and DVD-ROM dish.
Transmission medium
Instruction 3424 can also be sent or be received by the communication network 3426 with transmission medium.Instruction 3424 can be used any (for example HTTP) in Network Interface Unit 3420 and multiple known host-host protocol to transmit.The example of communication network comprises LAN, WAN, the Internet, mobile telephone network, ordinary old style telephone (POTS) network and radio data network (for example, Wi-Fi tMand WiMax tMnetwork).Term " transmission medium " is appreciated that and comprises any invisible medium that can store, encode or carry the instruction that will be carried out by machine, and described invisible medium comprises the signal of communication of numeral or simulation or contributes to other invisible medium of this software communication.
Statement
web service
1. the method that operation can remote-operated lock, the method comprises: at web services place, receive the voucher from portable electron device; Authenticate described voucher; And based on successful authentication, from web services, send the order that will be received by this interlocking.
2. according to the method for statement 1, the voucher wherein receiving at web services place from portable electron device comprises the device voucher that reception is relevant to this portable electron device.
3. according to the method for statement 1 or 2, wherein install voucher and comprise at least one device voucher element of selecting from following one group, comprising: the gps coordinate of setting position, Wi-Fi tMiD, bluetooth tMiD, telephone number, SMS address and pin code.
4. according to any one method in statement 1-3, wherein said device certificate is buffered in this device.
5. according to any one method in statement 1-4, the voucher wherein receiving at web services place from portable electron device comprises the lock voucher receiving with phase-locked pass.
6. according to any one method in statement 1-5, wherein lock voucher and comprise at least one lock voucher element of selecting from following one group, comprising: the gps coordinate of lock or with this phase-locked associated identification label, Wi-Fi tMiD, bluetooth tMiD, near-field communication checking, the input of pin code, the identification of response (QR) code and time lock operation fast.
7. according to any one method in statement 1-5, wherein at least some lock vouchers are buffered in portable electron device.
8. according to any one method in statement 1-7, wherein the lock voucher of buffer memory allows by this device, described voucher to be authorized at least partly.
9. according to any one method in statement 1-8, wherein at least some authentication of voucher is carried out by web services.
10. according to any one method in statement 1-9, also comprise reception and authentication based on voucher, notify user immediate geographically close exercisable lock for this device, this is within geographically close exercisable lock is positioned at the distance determined of this device.
11. according to any one method in statement 1-10, also comprises that this device being detected approaches lock.
12. according to any one method in statement 1-11, device wherein detected and approaches lock and comprise and comprise one or more in the element in using following a group: read be positioned at lock proximity and with this phase-locked associated label; The gps coordinate of lock; The gps coordinate of device; Network detects, such as the Internet, Wi-Fi tMor bluetooth tMnetwork; Near-field communication checking; The input of pin code; Response (QR) code identification fast; Operate with time lock.
13. according to any one method in statement 1-11, wherein detect device approach lock comprise by least one voucher element of buffer memory in this device with by this device corresponding voucher that identify or that receive compare.
14. according to any one method in statement 1-11, device wherein detected and approaches lock and can start the software application on this device.
15. according to any one method in statement 1-11, also comprises the lock software application that is provided for installing on portable electron device, be associated with web services.
16. according to any one method in statement 1-15, and wherein this software application will approach lock and automatically start in response to this device being detected.
17. according to any one method in statement 1-16, and wherein this software application also will be notified the approaching lock of this device and voucher to web services when starting.
18. according to any one method in statement 1-17, wherein detect device approach lock comprise provide be positioned at lock proximity and with this phase-locked associated label.
19. according to any one method in statement 1-18, also comprises receiving showing the signal that this label has been read by portable electron device.
20. according to any one method in statement 1-18, and wherein this label is near-field communication (NFC) label.
21. according to any one method in statement 1-18, and wherein this label is encoded with software application unified resource designator (URI).
22. according to any one method in statement 1-21, and wherein the automatic startup of software application comprises by portable electron device recognition coding the unified resource designator (URI) in label.
23. according to any one method in statement 1-18, and wherein for label, unique code is encoded, and this unique code forms at least a portion of voucher.
24. according to any one method in statement 1-23, and wherein said voucher is authenticated with this unique code at least by web services.
25. according to any one method in statement 1-24, also comprises in response to the order of being sent by web services or portable electron device, uses the lock server of communicating by letter with this web services or portable electron device to control lock.
26. according to any one method in statement 1-25, wherein makes to lock server and in communications status, can realize the two-way communication of locking between server and web services with web services.
27. according to any one method in statement 1-25, also comprises that the wireless remote unit using with lock server communication sends order to lock.
28. according to any one method in statement 1-25, also comprises that the relay and control circuit using with lock server communication sends order to lock.
29. according to any one method in statement 1-25, also comprises that user's Internet service makes door lock server or lock and web services in communications status.
30. according to any one method in statement 1-25, also comprises the not state in communicating by letter with web services of notice Subscriber Application Barring Lock server.
31. according to any one method in statement 1-30, wherein notify Subscriber Application Barring Lock server not the state in communicating by letter with web services be in response to interlocking and receive and order unsuccessfully and occur.
32. according to any one method in statement 1-30, also comprises that in response to order, use can remote-operated lock and the successful actuating of notice Subscriber Application Barring Lock.
33. according to any one method in statement 1-33, the input that come from user of the order that will be received by interlocking that wherein web services sends based on receiving on portable electron device.
34. according to any one method in statement 1-33, the input that the software application that the order that will be received by interlocking that wherein web services sends is installed on portable electron device based on user's use provides.
35. according to any one method in statement 1-33, and wherein order is one of order of selecting from Management Information Base, comprising: locking, release, timely lock request, definite time limit release request, the request of switching locking/unlocking.
36. according to any one method in statement 1-33, and wherein order is associated with the latching operation scheme of customization.
37. according to any one method in statement 1-36, and wherein certificate comprises the unique code being associated with the user of portable electron device.
38. according to any one method in statement 1-37, also comprises and sends another unique code being associated with another user who locks.
39. according to any one method in statement 1-38, wherein authenticates described voucher and comprises and comprise one or more in the element in using following a group: gps coordinate, Wi-Fi tMnetwork detects, near-field communication is verified, the input of pin code; The identification of response (QR) code and regularly input fast.
40. according to any one method in statement 1-39, is also included in and can in remote-operated lock, be provided for and Wi-Fi tMthe Wi-Fi that network connects tMchip, and at least pass through Wi-Fi tMnetwork sends the order that will be received by interlocking.
41. according to any one method in statement 1-40, is also included as and can provides bluetooth by remote-operated lock tMconnect, and at least pass through bluetooth tMconnect and send the order that will be received by interlocking.
42. according to any one method in statement 1-41, and also comprise and allow lock and the portable electron device pairing that can use web, and at least by by sending the order that will be received by interlocking with the Internet connection that the portable electron device of web is set up.
43. according to any one method in statement 1-42, also comprises at least to receive voucher or user command from portable electron device by Internet connection.
44. according to any one method in statement 1-43, also comprises and providing and phase-locked associated video camera, is used for taking the people's attempt to operate this lock photo.
45. according to any one method in statement 1-44, also comprises being provided for detecting lock or with the vibration transducer of the vibration of this phase-locked associated door and receive the signal that at least derives from this vibration transducer.
46. according to any one method in statement 1-45, also comprises the signal of the vibration transducer of the received vibration that derives from detecting gate or lock is notified to user.
47. according to any one method in statement 1-46, wherein detect vibration comprise detect user lock or with specific knocking on this phase-locked associated door, this specific part that forms voucher of knocking.
48. according to any one method in statement 1-47, also comprises that the form with text (SMS) message receives described voucher from portable electron device.
49. according to any one method in statement 1-48, also comprises from user's portable electron device and receives the order of text (SMS) form of message and the order that makes to be received by the interlocking order based on text form.
50. according to any one method in statement 1-49, is also included as user the online account at web services place is provided.
51. according to any one method in statement 1-50, is also included on web services and provides access, for voucher or the order that will be received by interlocking by user's input.
52. according to any one method in statement 1-51, also comprises that the one or more web services that make in the connection element in using following a group can be communicated by letter with portable electron device, comprising: Wi-Fi tM, 3G/4G, EDGE, SMS and Ethernet.
53. according to any one method in statement 1-52, also comprises the trial of operable lock or request are notified to user.
54. according to any one method in statement 1-53, also comprises in response to this and notifies to authenticate the voucher receiving from user, and receive order from user with actuation lock.
proximity test
1. the method that operation can remote-operated lock, the method comprises: at web services place, authenticate the voucher receiving from portable electron device; Portable electron device detected and approach this lock; With from web services or portable electron device, send the order that will be received by this interlocking.
2. according to the method for statement 1, wherein authenticate the initial authentication that received voucher comprises portable electron device, this initial authentication makes portable electron device and to send the direct command that will be received by this interlocking with lock direct communication.
3. according to the method for statement 1 or 2, wherein at least some vouchers are buffered in portable electron device.
4. according to any one method in statement 1-3, wherein the voucher of buffer memory allows by this device, described voucher to be authorized at least partly.
5. according to any one method in statement 1-4, wherein the authentication of the residue of voucher is carried out by web services.
6. according to any one method in statement 2-5, wherein said voucher comprises at least one in the element in following a group, comprising: gps coordinate, Wi-Fi tMnetwork detects, near-field communication is verified, pin code is inputted, response (QR) code is identified and regularly input fast.
7. according to any one method in statement 1-6, wherein received voucher comprises the device voucher relevant with portable electron device.
8. according to any one method in statement 1-7, the device voucher that wherein received comprises at least one device voucher element of selecting from following one group, comprising: the gps coordinate of setting position, Wi-Fi tMiD, bluetooth tMiD, telephone number, SMS address and pin code.
9. according to any one method in statement 1-8, wherein received voucher comprises the lock voucher relevant with lock.
10. according to any one method in statement 1-9, wherein lock voucher and comprise at least one lock voucher element of selecting from following one group, comprising: the gps coordinate of lock or with this phase-locked associated identification label, Wi-Fi tMiD, bluetooth tMiD, near-field communication checking, the input of pin code, the identification of response (QR) code and time lock operation fast.
11. according to any one method in statement 1-10, device wherein detected and approaches lock and comprise and comprise one or more in the element in using following a group: read be positioned at lock proximity and with this phase-locked associated label; The gps coordinate of lock or device; Network detects, such as the Internet, Wi-Fi tMor bluetooth tMnetwork; Near-field communication checking; The input of pin code; Response (QR) code identification fast; Operate with time lock.
12. according to any one method in statement 1-11, wherein detect device approach lock comprise by least one voucher element of buffer memory in this device with by this device at least one corresponding voucher that identify or that receive compare.
13. according to any one method in statement 1-12, device wherein detected and approaches lock and also comprise the sign of notifying Subscriber Application Barring Lock.
14. according to any one method in statement 1-13, reception and the authentication of the voucher of the sign of wherein notifying Subscriber Application Barring Lock based on received.
15. according to any one method in statement 1-14, also comprises the geographic position based on user, notifies user's lock that a choosing operates or nearest operable locks.
16. according to any one method in statement 1-15, device wherein detected and approaches the software application that lock can be enabled in the upper installation of this device automatically.
17. according to any one method in statement 1-16, and wherein this software application is that third party applies.
18. according to any one method in statement 1-17, also comprises and is provided for application programming interface (API) that third party software and web services are combined, so that the portable electron device being associated can operable lock or communicated by letter with web services.
19. according to any one method in statement 1-16, the input that come from the user that use the software application of on device installing of the order that will be received by interlocking that wherein web services sends based on receiving on portable electron device.
20. according to any one method in statement 1-19, and the order wherein sent is one of order of selecting from Management Information Base, comprising: locking, release, timely lock request, definite time limit release request and the request of switching locking/unlocking.
21. according to any one method, wherein the lock software application of this software application for installing on portable electron device, being associated with web services in statement 16-20.
22. according to any one method in statement 1-16, and wherein this software application also for notifying voucher to web services when starting.
23. according to any one method in statement 16-22, wherein detect device approach lock comprise provide be positioned at lock proximity and with this phase-locked associated label, this label will be read by portable electron device, to start application.
24. according to any one method in statement 1-23, also comprises receiving showing the signal that this label has been read by portable electron device.
25. according to any one method in statement 1-23, and wherein this label is near-field communication (NFC) label.
26. according to any one method in statement 1-23, and wherein this label is encoded with software application unified resource designator (URI).
27. according to any one method in statement 1-26, and wherein the startup of software application comprises by portable electron device recognition coding the unified resource designator (URI) in label.
28. according to any one method in statement 1-23, and wherein for label, unique code is encoded, and this unique code forms at least a portion of voucher.
29. according to any one method in statement 1-28, wherein by web services, with this unique code at least, authenticates described voucher.
30. according to any one method in statement 1-29, also comprises and makes can be connected to Wi-Fi by remote-operated lock tMnetwork, RF or radio net or bluetooth tMdevice, and at least by this Wi-Fi tM, RF or radio net or bluetooth tMdevice sends the order that will be received by interlocking.
31. according to any one method in statement 1-30, also comprise and allow lock and the portable electron device pairing that can use web, and at least by sending the order that will be received by interlocking with the Internet connection that the portable electron device of web is set up by this.
32. according to any one method in statement 1-31, also comprises at least receive or send voucher or user command to portable electron device from portable electron device by Internet connection.
33. according to any one method in statement 1-32, also comprises and providing and phase-locked associated appurtenances, and these parts, for combining with lock, web services or user or communicating with this lock, web services or user, help operate this lock to have at least.
34. according to any one method in statement 1-33, wherein appurtenances are parts of selecting from one group of parts, and these group parts comprise: lock power supply unit, latching operation parts, lock server, link, pin or order input small keyboard, Existing detector, vibration transducer, doormat, doorbell and video or photography machine.
35. according to any one method in statement 1-34, and wherein link is the parts of selecting from one group of parts, and these group parts comprise: bluetooth tM, radio frequency (RF), Wi-Fi tM, the Internet, infrared ray and piezoelectricity.
36. according to any one method in statement 1-35, and wherein appurtenances have passive and active state, and portable electron device wherein detected and approach lock and can trigger appurtenances and enter its active state, or makes this parts executable operations.
37. according to any one method in statement 1-36, portable electron device wherein detected and approaches lock and comprise and notify these appurtenances of user do not combine or communicate with lock or web services.
38. according to any one method in statement 1-37, wherein notify these parts of user not the state in combining or communicate by letter with lock or web services be in response to interlocking and receive and order unsuccessfully and occur.
39. according to any one method in statement 1-38, also comprises that in response to order, use can remote-operated lock and the successful actuating of notice Subscriber Application Barring Lock.
40. according to any one method in statement 1-39, and wherein order is associated with the latching operation of customization.
41. according to any one method in statement 1-40, and wherein certificate comprises the unique code being associated with the user of portable electron device.
42. according to any one method in statement 1-41, also comprises and sends another unique code being associated with another user who locks.
43. according to any one method in statement 1-42, also comprises the second user is notified to first user the trial of operable lock or request.
44. according to any one method in statement 1-43, also comprises in response to this and notifies to authenticate the voucher receiving from first user, and receive order from first user with actuation lock.
45. according to any one method in statement 1-44, also comprises that the form with text (SMS) message receives described voucher from portable electron device.
46. according to any one method in statement 1-45, also comprises from user's portable electron device and receives the order of text (SMS) form of message and the order that makes to be received by the interlocking order based on text form.
47. according to any one method in statement 1-46, is also included as user the online account on web services is provided.
48. according to any one method in statement 1-47, is also included on web services and provides access, for voucher or the order that will be received by interlocking by user's input.
application programming interface (API)
1. the method that operation can remote-operated lock, the method comprises: the first web services that is provided for receiving from the portable electron device of software application is installed voucher or order; From this web services, send the order that will be received by interlocking; With the application programming interface (API) that is provided for the second web services or described software application and described the first web services to combine on the first web services, so that this portable electron device can be communicated by letter with lock or web services.
2. according to the method for statement 1, wherein this software application is third party software application.
3. according to statement 1 or 2 method, wherein in conjunction with being in response to, come from access the first web services of user or the request of lock is carried out.
4. according to any one method in statement 1-3, also comprise that the voucher to receiving authenticates on web services, and based on successful authentication, send the order that will be received by interlocking.
5. according to any one method in statement 1-4, wherein received voucher is relevant with lock.
6. according to any one method in statement 1-5, wherein received voucher is relevant with portable electron device.
7. according to any one method in statement 1-6, the voucher that wherein received is relevant to third party user or second web services of request access the first web services or lock.
8. according to any one method in statement 1-7, the order that wherein will be received by interlocking is received by interlocking by the second web services.
9. according to any one method in statement 4-8, wherein in conjunction with being in response to, come from access first web services of unauthenticated user or the request of lock is carried out.
10. according to any one method in statement 7-9, wherein the received voucher relevant with third party user or the second web services authenticated by the authenticated of locking.
11. according to any one method in statement 1-10, and wherein third party or the second web services can seamlessly be given an order or seamlessly from interlocking, receive data to lock.
12. according to any one method in statement 2-11, and wherein the generation of third party's application based on external event is with user's the automatic request access lock of name.
13. according to any one method in statement 1-12, wherein external event can be the event of selecting from following group, comprising: be predefined in room, the request used sometime and enter safe house, send parcel, check house, enter in automobile and use bicycle.
the embodiment of indefiniteness
Although introduced the present invention with reference to concrete embodiment, it will be understood by those skilled in the art that and can carry out various changes and replace its element with equivalent it, and can not exceed real thought of the present invention and scope.In addition, can retrofit, and can not exceed essence instruction of the present invention.And the example of each indefiniteness of introducing herein can independently realize, or also can with other example in one or more by various replacement or combine.
Above-mentioned embodiment comprises that these accompanying drawings have formed a part for embodiment to the quoting of accompanying drawing.These accompanying drawings have been shown and can have been implemented the specific embodiment of the present invention in the mode of graphic extension.These embodiments are in this article also referred to as " example ".These examples can comprise other element except the element that those are shown or introduce.But, the present inventor has also imagined only provides those examples shown or element introduced.And, for specific example (or its one or more aspects), or for shown or other the example (or its one or more aspects) introduced herein, the present inventor has also imagined and has used shown before those or any combination of method element (or its one or more aspects) that introduce or the example of displacement.
If just in case there is inconsistent usage between this document and any file of being incorporated herein by reference, the usage in presents will be top dog so.
In presents, the same with general patent documentation, term " " or " one " are for comprising one or more, irrelevant with any other situation " at least one " or " one or mores' " use.In this article, term " or " for represent non-exclusive or, thereby " A or B " comprises " the non-B of A ", " the non-A of B " and " A and B ", except as otherwise noted.In this article, term " comprises " and " wherein " is used as that corresponding term " comprises " and the simple synonym of " therein ".And, in appending claims, term " comprises " and " comprising " is open,, if system, device, product, structure, formula or technique comprise other element except those elements that this term is listed afterwards in the claims, within these systems, device, product, structure, formula or technique are still considered to drop on the scope of this claim.And in appending claims, term " first ", " second " and " the 3rd " etc., only as label, not intend to be used for their object to force numerical value requirement.
The method example of introducing herein can be at least partly with machine or computer implemented.Some example can comprise with computer-readable medium or the machine readable media of instruction encoding that can carry out the electronic installation to be configured to carry out the operation of the method for introducing in earlier examples.The implementation of these methods can comprise code, such as microcode, assembly language code, higher-level language code etc.These codes can comprise for carrying out the computer-readable instruction of the whole bag of tricks.Code can form the part of computer program.In addition, in one example, code can be visibly stored on interim or non-volatile tangible computer-readable mediums one or more volatibility, non-, such as the term of execution or at other constantly.The example of these tangible computer-readable mediums can comprise, but be not limited to, hard disk, can plug disk, pluggable light dish (for example, compact disc and digital video disk), tape, storage card or memory stick, random-access memory (ram), ROM (read-only memory) (ROM) etc.
Introduction above provides in order to illustrate, rather than in order to limit.For example, the example of introducing above (or its one or more aspects) can combination with one another be used together.Such as those of ordinary skills are when reading introducing above, can use other embodiment.Summary is in accordance with C.F.R. § 1.72(b) provide, so that reader can learn essence of the present disclosure fast.Its submission prerequisite is not to be used in scope or the implication of explaining or limiting claim.And, in above-mentioned embodiment, various feature can be concentrated in together to simplify disclosed content.This open feature that should not be interpreted as failed call right is absolutely necessary for any claim.On the contrary, subject matter can be in being less than the characteristic state of concrete disclosed embodiment.Therefore, appending claims is as an example or embodiment and joining in embodiment, each claim can be established one's own system and be formed independent embodiment, and has considered that these embodiments can be by various combinations or replacement combination with one another.Scope of the present invention should determine according to appending claims, also has the have the right four corner of the equivalent that uses of this claim simultaneously.

Claims (38)

1. the method that operation can remote-operated lock, is characterized in that the method comprises:
At web services place, receive the voucher from portable electron device;
Authenticate described voucher; And
Based on success identity, from described web services or described portable electron device, send the order that will be received by described interlocking.
2. in accordance with the method for claim 1, it is characterized in that the voucher receiving at web services place from portable electron device comprises the device voucher that reception is relevant to described portable electron device, described device voucher comprises at least one device voucher element of selecting from following group, comprising: the gps coordinate of setting position, Wi-Fi tMiD, bluetooth tMiD, telephone number, SMS address and pin code.
3. according to claim 1 or method claimed in claim 2, it is characterized in that the voucher receiving at web services place from portable electron device comprises the lock voucher receiving with described phase-locked pass, described lock voucher comprises at least one lock voucher element of selecting from following group, comprising: the gps coordinate of lock or with this phase-locked associated identification label, Wi-Fi tMiD, bluetooth tMiD, near-field communication checking, the input of pin code, the identification of response (QR) code and time lock operation fast.
4. in accordance with the method for claim 3, it is characterized in that at least some lock vouchers are buffered in described portable electron device, the lock voucher of institute's buffer memory allows to authorize at least partly described voucher by this device.
5. according to the method described in any one in claim 1 to 4, also comprise reception and authentication based on described voucher, notify user from the immediate geographically close exercisable lock of this device, this is within geographically close exercisable lock is positioned at the distance determined of this device.
6. according to the method described in any one in claim 1 to 5, also comprise that described device being detected approaches described lock.
7. in accordance with the method for claim 6, it is characterized in that detecting described device approaches described lock and comprises one or more in the element in using following group, comprise: read and be positioned at described lock proximity and input, respond fast (QR) yard identification with described phase-locked associated label, the gps coordinate of described lock, the gps coordinate of described device, network detection, near-field communication checking, pin code, and time lock operates.
8. according to the method described in any one in claim 1 to 7, wherein authenticate the initial authentication that received voucher comprises described portable electron device, it allows described portable electron device and described lock direct communication and sends the order that will be received by described interlocking.
9. in accordance with the method for claim 6, it is characterized in that detecting described device approaches described lock and can start the software application on described device.
10. in accordance with the method for claim 9, also comprise the lock software application that is provided for installing, be associated with described web services on described portable electron device.
11. in accordance with the method for claim 9, it is characterized in that described software application also notifies described device to approach described lock and notify described voucher to described web services when starting.
12. in accordance with the method for claim 6, it is characterized in that detecting described device approach described lock comprise provide be positioned at described lock proximity and with described phase-locked associated label.
13. in accordance with the method for claim 12, is also included in web services place and receives the signal that label has been read by described portable electron device.
14. according to the method described in claim 12 or claim 13, it is characterized in that described label is near-field communication (NFC) label, or encode with software application unified resource designator (URI).
15. according to the method described in any one in claim 12 to 14, it is characterized in that unique code coding for described label, this unique code form described voucher at least partly.
16. according to the method described in any one in claim 1 to 15, also comprises in response to the order of being sent by described web services or described portable electron device, uses the lock server of communicating by letter with this web services or portable electron device to control described lock.
17. in accordance with the method for claim 16, also comprises that the wireless remote unit or the relay and control circuit that use with described lock server communication send order to described lock.
18. according to the method described in claim 16 or claim 17, the Internet service that also comprises user make door lock server or described lock with described in web service is in communications status.
19. according to the method described in any one in claim 16 to 18, also comprises in response to described interlocking and receives and order unsuccessfully, notifies described in user and locks server communicating by letter with described web services.
20. according to the method described in any one in claim 1 to 19, also comprises that in response to order, use can remote-operated lock and notify the successful actuating of locking described in user.
21. according to the method described in any one in claim 1 to 20, it is characterized in that the order that will be received by the described interlocking input that comes from user based on receiving at described portable electron device place.
22. according to the method described in any one in claim 1 to 21, the input that the order that will be received by described interlocking is used the software application of installing on described portable electron device to provide based on user is provided, and wherein said order is one of order of selecting from Management Information Base, this group command comprises: locking, release, timely lock request, definite time limit release request, and switch locking/unlocking request.
23. according to the method described in any one in claim 1 to 22, it is characterized in that described order is associated with the latching operation scheme of customization.
24. according to the method described in any one in claim 1 to 23, it is characterized in that described voucher comprises the unique code being associated with the user of described portable electron device.
25. in accordance with the method for claim 24, also comprises and send another unique code being associated with another user of described lock.
26. according to the method described in any one in claim 1 to 25, it is characterized in that authenticating described voucher and comprises and comprise one or more in the element in using following a group: gps coordinate, network detect; Near-field communication checking, the input of pin code, response (QR) code identification fast, and regularly input.
27. according to the method described in any one in claim 1 to 26, is also included in and can in remote-operated lock, be provided for link connected to the network, and at least by this network, send the order that will be received by described interlocking.
28. according to the method described in any one in claim 1 to 27, also comprise and allow described lock and the portable electron device pairing that can use web, and at least by sending the order that will be received by described interlocking with the Internet connection that the portable electron device of web is set up by described.
29. in accordance with the method for claim 28, also comprises at least and from described portable electron device, receive described voucher or user command by described Internet connection.
30. according to the method described in any one in claim 1 to 29, also comprises being provided for detecting described lock or with the vibration transducer of the vibration of described phase-locked associated door and receive the signal that at least derives from this vibration transducer.
31. according to the method described in any one in claim 1 to 30, also comprises that the form with text (SMS) message receives described voucher from described portable electron device.
32. according to the method described in any one in claim 1 to 31, also comprises the order that receives text (SMS) form of message from user's portable electron device, and makes the order that will be received by the described interlocking order based on text form.
33. according to the method described in any one in claim 1 to 32, is also included as user the online account at described web services place is provided.
34. according to the method described in any one in claim 1 to 33, also be included in described web services place and be provided for the application programming interface (API) that the second web services or software application and described web services are combined, to allow described portable electron device to communicate by letter with described lock or described web services.
35. 1 kinds for operate can remote-operated lock system, it is characterized in that this system comprises:
Web services, for:
From portable electron device, receive voucher;
Authenticate received voucher; And
When voucher authentication success, send the order that will be received by described interlocking.
36. according to the system described in claim 35, it is characterized in that described web services also approaches described lock for detection of described portable electron device.
37. according to the system described in claim 35 or 36, also comprise described in being positioned at, lock or contiguous with described lock and with described phase-locked associated label, this label is used for allowing described portable electron device from this tag recognition or receives voucher, and allows described web services described portable electron device to be detected to approach described lock.
38. according to the system described in any one in claim 35 to 37, also comprise application programming interface (API), for the second web services or software application and described web services are combined, to allow described portable electron device to communicate by letter with described lock or described web services.
CN201280032878.2A 2011-05-02 2012-05-02 Systems and methods for controlling a locking mechanism using a portable electronic device Pending CN103635940A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161481518P 2011-05-02 2011-05-02
US61/481,518 2011-05-02
PCT/US2012/036141 WO2012151290A1 (en) 2011-05-02 2012-05-02 Systems and methods for controlling a locking mechanism using a portable electronic device

Publications (1)

Publication Number Publication Date
CN103635940A true CN103635940A (en) 2014-03-12

Family

ID=46052923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280032878.2A Pending CN103635940A (en) 2011-05-02 2012-05-02 Systems and methods for controlling a locking mechanism using a portable electronic device

Country Status (5)

Country Link
US (9) US20120280783A1 (en)
EP (1) EP2710562A1 (en)
CN (1) CN103635940A (en)
CA (1) CA2834964A1 (en)
WO (1) WO2012151290A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639536A (en) * 2015-01-05 2015-05-20 浪潮(北京)电子信息产业有限公司 Method and system for preventing network attack
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN105608765A (en) * 2015-09-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access authorization control method and device
CN105698844A (en) * 2014-11-24 2016-06-22 江苏省精创电气股份有限公司 Temperature and humidity recorder safety control method
CN105799542A (en) * 2015-03-11 2016-07-27 孙欣 Electric vehicle control system and method
CN106355714A (en) * 2016-08-31 2017-01-25 郑成富 Fingerprint lockset management system and method
CN106460408A (en) * 2014-04-07 2017-02-22 卡巴伊科有限公司 Temporarily pairing a mobile device with a peripheral device
CN106485812A (en) * 2015-08-25 2017-03-08 韩华综合化学株式会社 The control system and method for locking device
CN107004314A (en) * 2014-12-02 2017-08-01 开利公司 For the long-range programming of the metering-in control system using virtual card data
CN107251105A (en) * 2014-10-19 2017-10-13 阿赫塔尔·哈利勒 Motor vehicle security protection and vehicle security system
CN107683601A (en) * 2015-06-05 2018-02-09 苹果公司 Relay services for the communication between controller and annex
CN107749097A (en) * 2017-09-28 2018-03-02 上海若禅信息科技有限公司 A kind of blue-tooth intelligence door lock awakening method and method for unlocking
US10382608B2 (en) 2011-05-02 2019-08-13 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
CN110145187A (en) * 2019-06-18 2019-08-20 前海随身宝(深圳)科技有限公司 Control method for electronic lock, device, intelligent luggage and readable storage medium storing program for executing
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
CN111480185A (en) * 2017-12-15 2020-07-31 亚萨合莱有限公司 Provisioning credential sets when network connectivity is unavailable
CN112189221A (en) * 2018-04-24 2021-01-05 品谱股份有限公司 Certificate provisioning for electronic lock authentication of a server
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components

Families Citing this family (582)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110225697A1 (en) * 2002-06-21 2011-09-22 John Griffits Lingerie with electronic closures undone by cellular phone or an electronic game
US9141276B2 (en) 2005-03-16 2015-09-22 Icontrol Networks, Inc. Integrated interface for mobile device
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US20090077623A1 (en) 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US11190578B2 (en) 2008-08-11 2021-11-30 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US20160065414A1 (en) 2013-06-27 2016-03-03 Ken Sundermeyer Control system user interface
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8635350B2 (en) 2006-06-12 2014-01-21 Icontrol Networks, Inc. IP device discovery systems and methods
US7711796B2 (en) 2006-06-12 2010-05-04 Icontrol Networks, Inc. Gateway registry methods and systems
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
EP1738540B1 (en) 2004-03-16 2017-10-04 Icontrol Networks, Inc. Premises management system
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US7482923B2 (en) 2005-01-27 2009-01-27 The Chamberlain Group, Inc. Alarm system interaction with a movable barrier operator method and apparatus
US20170180198A1 (en) 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US20120324566A1 (en) 2005-03-16 2012-12-20 Marc Baum Takeover Processes In Security Network Integrated With Premise Security System
US20110128378A1 (en) 2005-03-16 2011-06-02 Reza Raji Modular Electronic Display Platform
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US20080061926A1 (en) * 2006-07-31 2008-03-13 The Chamberlain Group, Inc. Method and apparatus for utilizing a transmitter having a range limitation to control a movable barrier operator
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US7633385B2 (en) 2007-02-28 2009-12-15 Ucontrol, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US8451986B2 (en) 2007-04-23 2013-05-28 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US11423756B2 (en) * 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US20170185278A1 (en) 2008-08-11 2017-06-29 Icontrol Networks, Inc. Automation system user interface
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US10140781B2 (en) * 2009-04-15 2018-11-27 Ford Global Technologies, Llc Vehicle wireless information system
US8638211B2 (en) 2009-04-30 2014-01-28 Icontrol Networks, Inc. Configurable controller and interface for home SMA, phone and multimedia
US8836467B1 (en) 2010-09-28 2014-09-16 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
WO2012077993A2 (en) * 2010-12-09 2012-06-14 (주)지트론 Door lock system
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US9147337B2 (en) 2010-12-17 2015-09-29 Icontrol Networks, Inc. Method and system for logging security event data
US9501883B2 (en) 2011-03-17 2016-11-22 Unikey Technologies Inc. Wireless access control system including lock assembly generated magnetic field based unlocking and related methods
US9501880B2 (en) 2011-03-17 2016-11-22 Unikey Technologies Inc. Wireless access control system including remote access wireless device generated magnetic field based unlocking and related methods
US20140077929A1 (en) * 2012-03-08 2014-03-20 Unikey Technologies, Inc. Wireless access control system and related methods
US9057210B2 (en) * 2011-03-17 2015-06-16 Unikey Technologies, Inc. Wireless access control system and related methods
US9336637B2 (en) 2011-03-17 2016-05-10 Unikey Technologies Inc. Wireless access control system and related methods
US9196104B2 (en) 2011-03-17 2015-11-24 Unikey Technologies Inc. Wireless access control system and related methods
US10505751B2 (en) * 2011-08-25 2019-12-10 Siemens Industry, Inc. Synergistic interface system for a building network
TWI535922B (en) * 2011-10-14 2016-06-01 鴻海精密工業股份有限公司 Electronic locking system and control device and method thereof
US9467862B2 (en) 2011-10-26 2016-10-11 Milwaukee Electric Tool Corporation Wireless tracking of power tools and related devices
US9698997B2 (en) 2011-12-13 2017-07-04 The Chamberlain Group, Inc. Apparatus and method pertaining to the communication of information regarding appliances that utilize differing communications protocol
US9734359B2 (en) 2011-12-22 2017-08-15 Intel Corporation Always-available embedded theft reaction subsystem
EP2795519A4 (en) * 2011-12-22 2015-09-02 Intel Corp Always-available embedded theft reaction subsystem
US11055940B2 (en) * 2011-12-30 2021-07-06 Consumer 2.0, Inc. Automated entry
US10930103B2 (en) * 2011-12-30 2021-02-23 Consumer 2.0, Inc. Automated entry
US8638190B1 (en) 2012-02-02 2014-01-28 Google Inc. Gesture detection using an array of short-range communication devices
WO2013123079A1 (en) * 2012-02-13 2013-08-22 Xceedid Corporation Credential management system
US20130257589A1 (en) * 2012-03-29 2013-10-03 Mohammad MOHIUDDIN Access control using an electronic lock employing short range communication with mobile device
DE102012008395A1 (en) * 2012-04-27 2013-10-31 Lock Your World Gmbh & Co. Kg Method and system for secure key handover
EP2847402A4 (en) 2012-05-08 2016-03-30 Schlage Lock Co Llc Remote management of electronic products
US20130305353A1 (en) * 2012-05-10 2013-11-14 Rutherford Controls International Corp. Low Power Driver System and Method for Controlling The Same
JP5856012B2 (en) 2012-05-23 2016-02-09 日立マクセル株式会社 Mobile terminal and control method thereof
AT513016B1 (en) * 2012-06-05 2014-09-15 Phactum Softwareentwicklung Gmbh Method and device for controlling a locking mechanism with a mobile terminal
US20130342314A1 (en) * 2012-06-22 2013-12-26 Gun Chen Smart lock structure and operating method thereof
WO2014007870A1 (en) * 2012-07-06 2014-01-09 Fingi Inc. Entry lock control and operation system
US9330514B2 (en) * 2012-07-25 2016-05-03 Utc Fire & Security Corporation Systems and methods for locking device management
US9985942B2 (en) * 2012-07-30 2018-05-29 Weckey Portable sign-in service
WO2014021054A1 (en) * 2012-07-31 2014-02-06 フェリカネットワークス株式会社 Information processing device, server device, and information processing system
US9514585B2 (en) 2012-08-16 2016-12-06 Schlage Lock Company Llc Wireless electronic lock system and method
US20140049367A1 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Automatic unlock device and method
US9508206B2 (en) 2012-08-16 2016-11-29 Schlage Lock Company Llc Usage of GPS on door security
WO2014028897A1 (en) 2012-08-16 2014-02-20 Schlage Lock Company Llc Cloud and smartphone communication system and method
US9437062B2 (en) 2012-08-16 2016-09-06 Schlage Lock Company Llc Electronic lock authentication method and system
US9472034B2 (en) * 2012-08-16 2016-10-18 Schlage Lock Company Llc Electronic lock system
CA2886378C (en) 2012-08-16 2022-06-14 Xceedid Corporation Cloud-based wireless communication system and method
WO2014028893A2 (en) 2012-08-16 2014-02-20 Schlage Lock Company Llc Wireless reader system
WO2014028896A2 (en) * 2012-08-16 2014-02-20 Schlage Lock Company Llc Operation communication system
EP2701124B1 (en) * 2012-08-21 2021-08-11 Bekey A/S Controlling access to a location
US9306743B2 (en) 2012-08-30 2016-04-05 Texas Instruments Incorporated One-way key fob and vehicle pairing verification, retention, and revocation
US8943187B1 (en) 2012-08-30 2015-01-27 Microstrategy Incorporated Managing electronic keys
GB201216284D0 (en) * 2012-09-12 2012-10-24 Illinois Tool Works A secure door entry system and method
KR20140051012A (en) 2012-10-22 2014-04-30 삼성전자주식회사 Electronic key and memethods for electronic for transmitting the electronic key and thereof
GB2507549A (en) * 2012-11-02 2014-05-07 Sony Corp Controlling electrical devices associated with a property based on mobile device location
US9122254B2 (en) 2012-11-08 2015-09-01 The Chamberlain Group, Inc. Barrier operator feature enhancement
US9363010B2 (en) * 2012-12-03 2016-06-07 Samsung Electronics Co., Ltd. Mobile terminal and method of controlling function of the mobile terminal
US20140152421A1 (en) * 2012-12-04 2014-06-05 Cellco Partnership D/B/A Verizon Wireless Near field communication based key control service
US10240365B2 (en) 2012-12-12 2019-03-26 Spectrum Brands, Inc. Electronic lock system having proximity mobile device
EP3010003B1 (en) * 2012-12-13 2021-03-24 Samsung Electronics Co., Ltd. Method and apparatus for controlling devices in home network system
ITTO20121070A1 (en) * 2012-12-13 2014-06-14 Istituto Superiore Mario Boella Sul Le Tecnologie WIRELESS COMMUNICATION SYSTEM WITH SHORT RADIUS INCLUDING A SHORT-COMMUNICATION SENSOR AND A MOBILE TERMINAL WITH IMPROVED FUNCTIONALITY AND RELATIVE METHOD
US9471697B2 (en) * 2012-12-27 2016-10-18 Intel Corporation URI-Based host to mobile device setup and pairing
EP2941844A4 (en) * 2013-01-04 2016-08-31 Unikey Technologies Inc Wireless access control system and related methods
US9999013B2 (en) * 2013-01-22 2018-06-12 Mimio, Llc Two-dimensional code-driven method and system for synchronizing wireless devices with a computing device
WO2014120029A1 (en) 2013-01-29 2014-08-07 Dco4Sp. Zo.O. Authentication method in a payment system with portable equipment
US8919024B2 (en) * 2013-02-06 2014-12-30 Karl F. Milde, Jr. Secure smartphone-operated gun trigger lock
US9312926B2 (en) 2013-02-07 2016-04-12 Schlage Lock Company Llc System and method for NFC peer-to-peer authentication and secure data transfer
US9307403B2 (en) 2013-02-07 2016-04-05 Schlage Lock Company Llc System and method for NFC peer-to-peer authentication and secure data transfer
EP2954709A4 (en) * 2013-02-08 2016-08-31 Schlage Lock Co Llc Control system and method
US9069770B2 (en) 2013-02-12 2015-06-30 Adidas Ag Method of providing digital content for users of physical items
EP2956913A1 (en) 2013-02-15 2015-12-23 Bernhard Mehl Arrangement for the authorised access of at least one structural element located in a building
US20140280840A1 (en) * 2013-03-14 2014-09-18 Jiphun C. Satapathy Systems, methods, and computer program products for providing a universal persistence cloud service
EP2972780B1 (en) * 2013-03-15 2020-11-04 Sargent Manufacturing Company Electronic circuit to capture lock controller pulses
US9367978B2 (en) 2013-03-15 2016-06-14 The Chamberlain Group, Inc. Control device access method and apparatus
US9447609B2 (en) 2013-03-15 2016-09-20 August Home, Inc. Mobile device that detects tappings/vibrations which are used to lock or unlock a door
US9574372B2 (en) 2013-03-15 2017-02-21 August Home, Inc. Intelligent door lock system that minimizes inertia applied to components
US9704314B2 (en) 2014-08-13 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of Bluetooth LE devices at an exterior of a dwelling
US10017963B2 (en) * 2013-03-15 2018-07-10 August Home, Inc. Intelligent door lock system with manual operation and push notification
US11527121B2 (en) 2013-03-15 2022-12-13 August Home, Inc. Door lock system with contact sensor
US9922481B2 (en) 2014-03-12 2018-03-20 August Home, Inc. Intelligent door lock system with third party secured access to a dwelling
US20170228603A1 (en) * 2013-03-15 2017-08-10 August Home, Inc. Door lock system with wide view camera
US9916746B2 (en) * 2013-03-15 2018-03-13 August Home, Inc. Security system coupled to a door lock system
US9818247B2 (en) 2015-06-05 2017-11-14 August Home, Inc. Intelligent door lock system with keypad
US11441332B2 (en) * 2013-03-15 2022-09-13 August Home, Inc. Mesh of cameras communicating with each other to follow a delivery agent within a dwelling
US11072945B2 (en) * 2013-03-15 2021-07-27 August Home, Inc. Video recording triggered by a smart lock device
US9396598B2 (en) 2014-10-28 2016-07-19 The Chamberlain Group, Inc. Remote guest access to a secured premises
US11421445B2 (en) 2013-03-15 2022-08-23 August Home, Inc. Smart lock device with near field communication
US9727831B2 (en) * 2013-03-15 2017-08-08 Vivint, Inc. Methods for prompting a user to use enhanced automation system features, and systems and devices related thereto
US10388094B2 (en) 2013-03-15 2019-08-20 August Home Inc. Intelligent door lock system with notification to user regarding battery status
EP2974223A2 (en) * 2013-03-15 2016-01-20 Assa Abloy AB Digital credential with embedded authentication instructions
KR102038746B1 (en) 2013-03-15 2019-10-30 스펙트럼 브랜즈, 인크. Wireless lockset with integrated antenna, touch activation, and light communication device
US10691953B2 (en) 2013-03-15 2020-06-23 August Home, Inc. Door lock system with one or more virtual fences
US9382739B1 (en) 2013-03-15 2016-07-05 August Home, Inc. Determining right or left hand side door installation
US10229548B2 (en) 2013-03-15 2019-03-12 The Chamberlain Group, Inc. Remote guest access to a secured premises
US11352812B2 (en) * 2013-03-15 2022-06-07 August Home, Inc. Door lock system coupled to an image capture device
US10181232B2 (en) * 2013-03-15 2019-01-15 August Home, Inc. Wireless access control system and methods for intelligent door lock system
US11802422B2 (en) 2013-03-15 2023-10-31 August Home, Inc. Video recording triggered by a smart lock device
CN105190720A (en) * 2013-03-15 2015-12-23 Adt美国控股股份有限公司 Security system access profiles
US10140828B2 (en) 2015-06-04 2018-11-27 August Home, Inc. Intelligent door lock system with camera and motion detector
US9624695B1 (en) 2013-03-15 2017-04-18 August Home, Inc. Intelligent door lock system with WiFi bridge
US11043055B2 (en) 2013-03-15 2021-06-22 August Home, Inc. Door lock system with contact sensor
WO2014144419A2 (en) 2013-03-15 2014-09-18 Master Lock Company Networked security system
US10443266B2 (en) * 2013-03-15 2019-10-15 August Home, Inc. Intelligent door lock system with manual operation and push notification
US10114938B2 (en) 2013-03-22 2018-10-30 Utc Fire And Security Americas Corporation, Inc. Secure electronic lock
WO2014146186A1 (en) * 2013-03-22 2014-09-25 Keyfree Technologies Inc. Managing access to a restricted area
EP2981933A4 (en) 2013-03-28 2016-09-14 Fabtale Productions Pty Ltd Methods and systems for connecting physical objects to digital communications
US8844811B1 (en) 2013-06-04 2014-09-30 April Elizabeth Rogers System and method for controlling locks
US9571164B1 (en) * 2013-06-21 2017-02-14 EMC IP Holding Company LLC Remote authentication using near field communication tag
US10115287B2 (en) 2013-07-10 2018-10-30 Advanced Wireless Innovations Llc Monitoring system, apparatus and method
EP3675487A1 (en) * 2013-07-17 2020-07-01 Bot Home Automation Inc. Computer system and method
US9058738B1 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9179108B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9165444B2 (en) 2013-07-26 2015-10-20 SkyBell Technologies, Inc. Light socket cameras
US9769435B2 (en) 2014-08-11 2017-09-19 SkyBell Technologies, Inc. Monitoring systems and methods
US10440165B2 (en) 2013-07-26 2019-10-08 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US9060103B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell security and safety
US9113052B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9235943B2 (en) 2013-07-26 2016-01-12 Joseph Frank Scalisi Remote identity verification of lodging guests
US9160987B1 (en) 2013-07-26 2015-10-13 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9049352B2 (en) 2013-07-26 2015-06-02 SkyBell Technologies, Inc. Pool monitor systems and methods
US9142214B2 (en) 2013-07-26 2015-09-22 SkyBell Technologies, Inc. Light socket cameras
US9179109B1 (en) 2013-12-06 2015-11-03 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9237318B2 (en) 2013-07-26 2016-01-12 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9172921B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell antenna
US9179107B1 (en) 2013-07-26 2015-11-03 SkyBell Technologies, Inc. Doorbell chime systems and methods
US8953040B1 (en) 2013-07-26 2015-02-10 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US9736284B2 (en) 2013-07-26 2017-08-15 SkyBell Technologies, Inc. Doorbell communication and electrical systems
US10733823B2 (en) 2013-07-26 2020-08-04 Skybell Technologies Ip, Llc Garage door communication systems and methods
US8947530B1 (en) 2013-07-26 2015-02-03 Joseph Frank Scalisi Smart lock systems and methods
US11651665B2 (en) 2013-07-26 2023-05-16 Skybell Technologies Ip, Llc Doorbell communities
US9094584B2 (en) 2013-07-26 2015-07-28 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10044519B2 (en) 2015-01-05 2018-08-07 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9342936B2 (en) 2013-07-26 2016-05-17 SkyBell Technologies, Inc. Smart lock systems and methods
US9118819B1 (en) 2013-07-26 2015-08-25 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9230424B1 (en) 2013-12-06 2016-01-05 SkyBell Technologies, Inc. Doorbell communities
US10672238B2 (en) 2015-06-23 2020-06-02 SkyBell Technologies, Inc. Doorbell communities
US8937659B1 (en) 2013-07-26 2015-01-20 SkyBell Technologies, Inc. Doorbell communication and electrical methods
US9172922B1 (en) 2013-12-06 2015-10-27 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9053622B2 (en) 2013-07-26 2015-06-09 Joseph Frank Scalisi Light socket cameras
US9065987B2 (en) 2013-07-26 2015-06-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10204467B2 (en) 2013-07-26 2019-02-12 SkyBell Technologies, Inc. Smart lock systems and methods
US9197867B1 (en) 2013-12-06 2015-11-24 SkyBell Technologies, Inc. Identity verification using a social network
US11889009B2 (en) 2013-07-26 2024-01-30 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US9060104B2 (en) 2013-07-26 2015-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9196133B2 (en) 2013-07-26 2015-11-24 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10708404B2 (en) 2014-09-01 2020-07-07 Skybell Technologies Ip, Llc Doorbell communication and electrical systems
US11004312B2 (en) 2015-06-23 2021-05-11 Skybell Technologies Ip, Llc Doorbell communities
US9172920B1 (en) 2014-09-01 2015-10-27 SkyBell Technologies, Inc. Doorbell diagnostics
US9013575B2 (en) 2013-07-26 2015-04-21 SkyBell Technologies, Inc. Doorbell communication systems and methods
US20170263067A1 (en) 2014-08-27 2017-09-14 SkyBell Technologies, Inc. Smart lock systems and methods
US8941736B1 (en) 2013-07-26 2015-01-27 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9113051B1 (en) 2013-07-26 2015-08-18 SkyBell Technologies, Inc. Power outlet cameras
US8823795B1 (en) 2013-07-26 2014-09-02 SkyBell Technologies, Inc. Doorbell communication systems and methods
US8872915B1 (en) 2013-07-26 2014-10-28 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9247219B2 (en) 2013-07-26 2016-01-26 SkyBell Technologies, Inc. Doorbell communication systems and methods
US20180343141A1 (en) 2015-09-22 2018-11-29 SkyBell Technologies, Inc. Doorbell communication systems and methods
GB2516686B (en) * 2013-07-30 2018-02-07 Paxton Access Ltd Communication method and system
US9544763B2 (en) * 2013-08-15 2017-01-10 Telefonaktiebolaget L M Ericsson (Publ) Disclosing and controlling collection of information from electronic devices
WO2015023737A1 (en) * 2013-08-15 2015-02-19 Unikey Technologies, Inc. Wireless access control system and related methods
US9916707B2 (en) 2013-08-19 2018-03-13 Arm Ip Limited Interacting with embedded devices within a user's environment
USD747733S1 (en) 2013-08-30 2016-01-19 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
USD747732S1 (en) 2013-08-30 2016-01-19 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
USD737283S1 (en) * 2013-08-30 2015-08-25 SkyBell Technologies, Inc. Display screen or portion thereof with a graphical user interface
WO2015033333A1 (en) * 2013-09-09 2015-03-12 N-Sip Ltd Communication channel between plugin application and browser script
US9704316B2 (en) 2013-09-10 2017-07-11 Gregory Paul Kirkjan Contactless electronic access control system
US8922333B1 (en) 2013-09-10 2014-12-30 Gregory Paul Kirkjan Contactless electronic access control system
US9373208B2 (en) * 2013-09-11 2016-06-21 Sony Corporation Secure remote control for operating closures such as garage doors
US20150077232A1 (en) * 2013-09-17 2015-03-19 Invue Security Products Inc. Near field communication devices for merchandise security
US9948359B2 (en) 2013-09-20 2018-04-17 At&T Intellectual Property I, L.P. Secondary short-range wireless assist for wireless-based access control
US9646434B2 (en) * 2013-10-10 2017-05-09 Google Technology Holdings LLC Method and system for controlling access to a restricted location
US20150121540A1 (en) * 2013-10-28 2015-04-30 Linear Llc Software and Inventory Licensing System and Method
US9113329B2 (en) * 2013-11-18 2015-08-18 Tyfone, Inc. Mobile device learning mode for secure identification
DE102014105247B4 (en) * 2013-12-05 2023-11-02 Deutsche Post Ag Selection of access control devices on an access authorization device based on information about a shipment
US9799183B2 (en) 2013-12-06 2017-10-24 SkyBell Technologies, Inc. Doorbell package detection systems and methods
US9786133B2 (en) 2013-12-06 2017-10-10 SkyBell Technologies, Inc. Doorbell chime systems and methods
US9743049B2 (en) 2013-12-06 2017-08-22 SkyBell Technologies, Inc. Doorbell communication systems and methods
US9253455B1 (en) 2014-06-25 2016-02-02 SkyBell Technologies, Inc. Doorbell communication systems and methods
CN106105169B (en) * 2013-12-17 2020-03-31 贝利莫控股公司 Mobile communication device and method for managing operation of multiple actuators
TWI532017B (en) 2013-12-25 2016-05-01 正文科技股份有限公司 Wireless control method, wireless host and switch control device
US9524594B2 (en) * 2014-01-10 2016-12-20 Honeywell International Inc. Mobile access control system and method
US9852656B2 (en) * 2014-01-13 2017-12-26 Barbara Ander Alarm monitoring system
US10274908B2 (en) 2014-01-13 2019-04-30 Barbara Ander System and method for alerting a user
US10600291B2 (en) 2014-01-13 2020-03-24 Alexis Ander Kashar System and method for alerting a user
US9608970B1 (en) 2014-01-16 2017-03-28 Microstrategy Incorporated Sharing keys
US20150228134A1 (en) * 2014-02-12 2015-08-13 Viking Access Systems, Llc Movable barrier operator configured for remote actuation
US10192377B2 (en) * 2014-02-12 2019-01-29 Elika Access Systems, Llc Movable barrier operator configured for remote actuation
US20150235173A1 (en) * 2014-02-18 2015-08-20 David R. Hall Automated Tracking-Number Based Administration of Access Codes
EP3108460A1 (en) * 2014-02-18 2016-12-28 Bekey A/S Controlling access to a location
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US9721411B2 (en) * 2014-03-18 2017-08-01 Google Inc. Proximity-initiated physical mobile device gestures
US9353551B2 (en) 2014-03-19 2016-05-31 Meghan Martinez Wireless door locking system
US20150269799A1 (en) * 2014-03-19 2015-09-24 Meghan Martinez Wireless door locking system
US9654922B2 (en) * 2014-03-21 2017-05-16 Venafi, Inc. Geo-fencing cryptographic key material
US9577823B2 (en) 2014-03-21 2017-02-21 Venafi, Inc. Rule-based validity of cryptographic key material
US9647998B2 (en) 2014-03-21 2017-05-09 Venafi, Inc. Geo-fencing cryptographic key material
US9680827B2 (en) * 2014-03-21 2017-06-13 Venafi, Inc. Geo-fencing cryptographic key material
US9531533B2 (en) 2014-03-21 2016-12-27 Venafi, Inc. Rule-based validity of cryptographic key material
US9686244B2 (en) 2014-03-21 2017-06-20 Venafi, Inc. Rule-based validity of cryptographic key material
DE102014104051A1 (en) * 2014-03-24 2015-09-24 Martin Lehmann Gmbh & Co. Kg Radio-controlled electromechanical locking system and method for operating a radio-controlled electromechanical locking system
TWI610273B (en) * 2014-03-28 2018-01-01 中興保全股份有限公司 Automatic visitor system and host thereof
US10026245B2 (en) * 2014-03-31 2018-07-17 Vivint, Inc. Mobile device based authentication
US9841743B2 (en) * 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US10115256B2 (en) * 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
EP2930698B1 (en) 2014-04-11 2020-09-23 9Solutions Oy Wireless locking system
CN105025048B (en) * 2014-04-22 2018-12-18 东莞安尔发智能科技股份有限公司 Realize the method and system of smart lock permission control
US10274909B2 (en) * 2014-04-25 2019-04-30 Vivint, Inc. Managing barrier and occupancy based home automation system
US10657749B2 (en) 2014-04-25 2020-05-19 Vivint, Inc. Automatic system access using facial recognition
US10235822B2 (en) 2014-04-25 2019-03-19 Vivint, Inc. Automatic system access using facial recognition
US10127754B2 (en) 2014-04-25 2018-11-13 Vivint, Inc. Identification-based barrier techniques
TW201543252A (en) * 2014-05-06 2015-11-16 和碩聯合科技股份有限公司 Remote control method with identity verification mechanism and wearable device performing the same
USD762688S1 (en) 2014-05-16 2016-08-02 SkyBell Technologies, Inc. Display screen or a portion thereof with a graphical user interface
TW201942458A (en) 2014-05-19 2019-11-01 黎巴嫩商艾克瑟斯智權控股公司 Mobile key devices systems and methods for programming and communicating with an electronic programmable key
US20150339869A1 (en) * 2014-05-21 2015-11-26 Bluetech Automation, LLC Automatic Wireless Door Opening System and Method of Using the Same
WO2015191190A1 (en) * 2014-06-11 2015-12-17 Carrier Corporation Hospitality systems
USD776689S1 (en) * 2014-06-20 2017-01-17 Google Inc. Display screen with graphical user interface
CH709804B1 (en) * 2014-06-23 2018-12-28 Legic Identsystems Ag Electronic access control device and access control method.
US9888216B2 (en) 2015-09-22 2018-02-06 SkyBell Technologies, Inc. Doorbell communication systems and methods
US20170085843A1 (en) 2015-09-22 2017-03-23 SkyBell Technologies, Inc. Doorbell communication systems and methods
US10687029B2 (en) 2015-09-22 2020-06-16 SkyBell Technologies, Inc. Doorbell communication systems and methods
US11184589B2 (en) 2014-06-23 2021-11-23 Skybell Technologies Ip, Llc Doorbell communication systems and methods
PL408651A1 (en) 2014-06-24 2016-01-04 Getyid Software & Service Spółka Z Ograniczoną Odpowiedzialnością Method for payment authorization in mobile devices
US20160378967A1 (en) * 2014-06-25 2016-12-29 Chian Chiu Li System and Method for Accessing Application Program
WO2016001477A1 (en) 2014-07-04 2016-01-07 Kone Corporation Allocation of facilities on a route
WO2016007732A1 (en) * 2014-07-09 2016-01-14 Deja View Concepts, Inc. Bluetooth low energy for access control
US9961059B2 (en) * 2014-07-10 2018-05-01 Red Hat Israel, Ltd. Authenticator plugin interface
EP2977964B1 (en) * 2014-07-25 2018-09-19 Skidata Ag Method for controlling a device via a mobile terminal requiring user rights
US9824193B2 (en) * 2014-07-29 2017-11-21 Aruba Networks, Inc. Method for using mobile devices with validated user network identity as physical identity proof
US9455839B2 (en) 2014-07-30 2016-09-27 Master Lock Company Llc Wireless key management for authentication
US9600949B2 (en) * 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
US9996999B2 (en) * 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
US9894066B2 (en) 2014-07-30 2018-02-13 Master Lock Company Llc Wireless firmware updates
US9823725B2 (en) * 2014-08-11 2017-11-21 Google Technology Holdings LLC Method and apparatus for adjusting a sleep mode display mechanism of an electronic device
WO2016023558A1 (en) * 2014-08-14 2016-02-18 Poly-Care Aps Method for operating a door lock by encrypted wireless signals
US9747739B2 (en) 2014-08-18 2017-08-29 Noke, Inc. Wireless locking device
US9865144B2 (en) 2014-08-19 2018-01-09 Sensormatic Electronics, LLC Video recognition in frictionless access control system
US9697656B2 (en) * 2014-08-19 2017-07-04 Sensormatic Electronics, LLC Method and system for access control proximity location
US10158550B2 (en) 2014-08-19 2018-12-18 Sensormatic Electronics, LLC Access control system with omni and directional antennas
US10235854B2 (en) 2014-08-19 2019-03-19 Sensormatic Electronics, LLC Tailgating detection in frictionless access control system
US9576412B2 (en) * 2014-08-20 2017-02-21 Verizon Patent And Licensing Inc. Network-assisted remote access portal
AU2015304955A1 (en) * 2014-08-21 2017-04-06 Peter Alexander CORDINER An electronic locking system
US10930101B2 (en) * 2014-08-27 2021-02-23 Ncr Corporation Self-service terminal (SST) safe and methods of operating a lock for the SST safe
US20160066254A1 (en) * 2014-09-02 2016-03-03 Intel Corporation Method and system for smart door directionality detection
US20160065676A1 (en) * 2014-09-02 2016-03-03 Raytheon BBN Technologies, Corp. Control Of Network Connected Systems
WO2016036661A1 (en) * 2014-09-05 2016-03-10 Utc Fire & Security Corporation System and method for access authentication
US9997036B2 (en) 2015-02-17 2018-06-12 SkyBell Technologies, Inc. Power outlet cameras
US9721077B1 (en) * 2014-10-03 2017-08-01 Isaac S. Daniel Secure electronic charger case for mobile communication devices
US11055682B2 (en) * 2014-10-13 2021-07-06 NCR Corportation Authenticated self-service terminal (SST) access
US20160116510A1 (en) 2014-10-27 2016-04-28 Master Lock Company Predictive battery warnings for an electronic locking device
FR3029378B1 (en) * 2014-11-27 2017-12-15 T@Gproduct Dev METHOD AND SYSTEM FOR COMMUNICATING BETWEEN REMOTE TERMINALS
MX2017007288A (en) * 2014-12-02 2017-08-25 Carrier Corp Access control system with virtual card data.
ES2925470T3 (en) * 2014-12-02 2022-10-18 Carrier Corp User intent capture when interacting with multiple access controls
US10062226B2 (en) 2014-12-02 2018-08-28 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
US9754433B2 (en) * 2014-12-03 2017-09-05 Southern Folger Detention Equipment Company, Llc Remote lock system
JP6627777B2 (en) 2014-12-09 2020-01-08 ソニー株式会社 Information processing system
BE1022614B1 (en) * 2014-12-10 2016-06-16 Viadact Nv Key management system
US9609022B2 (en) 2014-12-10 2017-03-28 Sybase, Inc. Context based dynamically switching device configuration
US9530264B2 (en) * 2014-12-15 2016-12-27 Assa Abloy Inc. Using low power radio to control a higher power communication interface
JP6596091B2 (en) * 2014-12-18 2019-10-23 アフェロ インコーポレイテッド Internet platform, apparatus and method
US20160179069A1 (en) * 2014-12-18 2016-06-23 Honeywell International Inc. Controlling a building management system
EP3035299B1 (en) * 2014-12-18 2019-03-27 Assa Abloy Ab Authentication of a user for access to a physical space
US9626814B2 (en) * 2014-12-23 2017-04-18 Vivint, Inc. Smart door lock
US20160187995A1 (en) * 2014-12-30 2016-06-30 Tyco Fire & Security Gmbh Contextual Based Gesture Recognition And Control
USD759702S1 (en) 2015-01-15 2016-06-21 SkyBell Technologies, Inc. Display screen or a portion thereof with a graphical user interface
USD760738S1 (en) 2015-01-15 2016-07-05 SkyBell Technologies, Inc. Display screen or a portion thereof with a graphical user interface
US9369287B1 (en) 2015-01-27 2016-06-14 Seyed Amin Ghorashi Sarvestani System and method for applying a digital signature and authenticating physical documents
US9728022B2 (en) 2015-01-28 2017-08-08 Noke, Inc. Electronic padlocks and related methods
AU2016391069B2 (en) * 2015-02-05 2022-12-01 Project Cloudkey, Inc. Systems and methods for entry control
US10521988B1 (en) * 2015-02-05 2019-12-31 Intelity, Inc. Guest management system
CN104794780B (en) * 2015-02-10 2017-09-12 深圳市尼得科技有限公司 A kind of intelligent door, intelligent accelerator control system and control method
EP3062294B1 (en) * 2015-02-27 2021-04-14 Qibixx AG Method and devices for upgrading an existing access control system
US9747740B2 (en) 2015-03-02 2017-08-29 Ford Global Technologies, Llc Simultaneous button press secure keypad code entry
US20160257198A1 (en) 2015-03-02 2016-09-08 Ford Global Technologies, Inc. In-vehicle component user interface
TW201706895A (en) 2015-03-03 2017-02-16 艾克瑟斯智權控股公司 Systems and methods for redundant access control systems based on mobile devices
US10742938B2 (en) 2015-03-07 2020-08-11 Skybell Technologies Ip, Llc Garage door communication systems and methods
WO2016145168A1 (en) * 2015-03-10 2016-09-15 Abb Technology Ag System and method for administering physical security access to components of a process control system
CA2979379C (en) 2015-03-10 2020-02-04 Schlage Lock Company Llc Communication protocols for electronic locks
US9582841B2 (en) 2015-03-24 2017-02-28 At&T Intellectual Property I, L.P. Location based emergency management plans
US10296851B2 (en) 2015-04-11 2019-05-21 At&T Intellectual Property I, L.P. Automatic allocation of physical facilities for maximum collaboration
US9824515B2 (en) * 2015-03-24 2017-11-21 At&T Intellectual Property I, L.P. Automatic calendric physical access
US9972144B2 (en) 2015-03-24 2018-05-15 At&T Intellectual Property I, L.P. Automatic physical access
US10157350B2 (en) * 2015-03-26 2018-12-18 Tata Consultancy Services Limited Context based conversation system
US10254749B2 (en) 2015-03-27 2019-04-09 Rockwell Automation Technologies, Inc. Systems and methods for virtually tagging and securing industrial equipment
US9971344B2 (en) * 2015-03-27 2018-05-15 Rockwell Automation Technologies, Inc. Systems and methods for assessing a quality of an industrial enterprise
US11575537B2 (en) 2015-03-27 2023-02-07 Skybell Technologies Ip, Llc Doorbell communication systems and methods
TW201636489A (en) * 2015-04-07 2016-10-16 速碼波科技股份有限公司 Electronic lock and unlocking verification mothod of the electronic lock
US11381686B2 (en) 2015-04-13 2022-07-05 Skybell Technologies Ip, Llc Power outlet cameras
US9875647B1 (en) * 2015-04-27 2018-01-23 Google Inc. Systems and methods for presenting security questions via connected security system
US9691205B2 (en) * 2015-05-08 2017-06-27 Shane Wesley Robinson Cloud controlled common access entry point locking system and method
US9613478B2 (en) 2015-05-18 2017-04-04 Unikey Technologies Inc. Wireless access control system for a door including door position based authentication and related methods
US9852561B2 (en) 2015-05-18 2017-12-26 Unikey Technologies Inc. Wireless access control system for a door including proximity based lock disabling and related methods
US10403066B2 (en) 2015-05-20 2019-09-03 Sensormatic Electronics, LLC Portable device having directional BLE antenna
WO2016191768A1 (en) * 2015-05-28 2016-12-01 Friday Labs Limited Apparatus and system for an electronic lock, and methods of use and manufacture thereof
US9396599B1 (en) * 2015-05-29 2016-07-19 Google Inc. Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock
DE102015210025A1 (en) * 2015-06-01 2016-12-15 Locumi Labs Gmbh Method, system and kit for automatic access authorization of an entrance door
US9947158B2 (en) 2015-06-01 2018-04-17 Schlage Lock Company Llc Access control device commissioning
US9652913B2 (en) * 2015-06-05 2017-05-16 Brivo Systems, Llc Geo-location estimate (GLE) sensitive physical access control apparatus, system, and method of operation
US9602279B1 (en) * 2015-06-09 2017-03-21 Amazon Technologies, Inc. Configuring devices for use on a network using a fast packet exchange with authentication
US10934132B2 (en) 2015-06-10 2021-03-02 Inventio Ag Lift system with predictive call production
KR101834337B1 (en) * 2015-06-15 2018-03-05 김범수 Electronic key and electronic locking apparatus of dual-authentication
US9792747B2 (en) * 2015-06-22 2017-10-17 Allegion, Inc. Multifunctional access control device
US20180047269A1 (en) 2015-06-23 2018-02-15 SkyBell Technologies, Inc. Doorbell communities
CN105006046A (en) * 2015-07-06 2015-10-28 河南科技大学 Cell phone NFC short-message warning and video monitoring entrance guard system and control method thereof
US9672674B2 (en) 2015-07-06 2017-06-06 Acsys Ip Holding, Inc. Systems and methods for secure lock systems with redundant access control
US9852562B2 (en) 2015-07-06 2017-12-26 Acsys Ip Holding, Inc. Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
CN105118116A (en) * 2015-07-28 2015-12-02 努比亚技术有限公司 Security protection terminal, device and method
CN105100480A (en) * 2015-07-29 2015-11-25 北京天宇朗通通信设备股份有限公司 Unlocking method of terminal, and terminal
US10706702B2 (en) 2015-07-30 2020-07-07 Skybell Technologies Ip, Llc Doorbell package detection systems and methods
US10489746B2 (en) 2015-07-30 2019-11-26 Espresa, Inc. Cloud based platform for vehicle related services
CN105069952A (en) * 2015-07-31 2015-11-18 合肥智凯电子科技有限公司 Household intelligent anti-theft system
IN2015CH04016A (en) * 2015-08-03 2015-08-14 Varadharajan Marur Srikrishna
US9773363B2 (en) 2015-08-11 2017-09-26 Schweitzer Engineering Laboratories, Inc. Transient asset management systems and methods
US10404714B1 (en) 2015-08-11 2019-09-03 Schweitzer Engineering Laboratories, Inc. Policy-managed physical access authentication
US9779566B2 (en) 2015-08-11 2017-10-03 Schweitzer Engineering Laboratories, Inc. Resource management based on physical authentication and authorization
US9922476B2 (en) 2015-08-11 2018-03-20 Schweitzer Engineering Laboratories, Inc. Local access control system management using domain information updates
US9858736B2 (en) * 2015-08-12 2018-01-02 Userstar Information System Co., Ltd. Password setting method and system, and lockset matching method and system
US9942734B1 (en) * 2015-08-19 2018-04-10 West Corporation SMS check in and check out
US9967717B2 (en) 2015-09-01 2018-05-08 Ford Global Technologies, Llc Efficient tracking of personal device locations
US9914418B2 (en) 2015-09-01 2018-03-13 Ford Global Technologies, Llc In-vehicle control location
US9622159B2 (en) 2015-09-01 2017-04-11 Ford Global Technologies, Llc Plug-and-play interactive vehicle interior component architecture
CN108027991B (en) * 2015-09-07 2022-01-14 通力股份公司 Method and system for controlling access in an environment
US9860710B2 (en) 2015-09-08 2018-01-02 Ford Global Technologies, Llc Symmetrical reference personal device location tracking
US9744852B2 (en) 2015-09-10 2017-08-29 Ford Global Technologies, Llc Integration of add-on interior modules into driver user interface
US9888346B2 (en) * 2015-09-18 2018-02-06 Hyatt Corporation Power management system for access control devices
CN107016752A (en) * 2015-09-29 2017-08-04 法拉第未来公司 Electrically operated gate discharges system
US9847020B2 (en) * 2015-10-10 2017-12-19 Videx, Inc. Visible light communication of an access credential in an access control system
US9524601B1 (en) 2015-12-28 2016-12-20 Unikey Technologies Inc. Wireless access control system including door position based lock switching and related methods
US9721413B2 (en) 2015-10-13 2017-08-01 Unikey Technologies Inc. Wireless access control system operating in automatic calibration mode and including door position based lock switching and related methods
US10749693B2 (en) 2015-10-21 2020-08-18 Rmd Innovations Pty. Ltd. Method and system for facilitating use of an electronically controlled lock
US10412088B2 (en) 2015-11-09 2019-09-10 Silvercar, Inc. Vehicle access systems and methods
CN108351930B (en) * 2015-11-19 2021-10-01 罗伯特·博世有限公司 Method for controlling security access to embedded device through networked computer
US9965911B2 (en) 2015-12-07 2018-05-08 Capital One Services, Llc Electronic access control system
US10046637B2 (en) 2015-12-11 2018-08-14 Ford Global Technologies, Llc In-vehicle component control user interface
US9697661B1 (en) 2015-12-28 2017-07-04 Unikey Technologies Inc. Wireless access control system including closed door position and exterior area remote access wireless communications device based lock switching and related methods
US9697658B1 (en) 2015-12-28 2017-07-04 Unikey Technologies Inc. Wireless access control system including closed door position and interior area remote access wireless communications device based lock switching and related methods
US9792742B2 (en) * 2016-02-02 2017-10-17 Live Nation Entertainment, Inc. Decentralized virtual trustless ledger for access control
US11495073B2 (en) 2016-02-02 2022-11-08 Live Nation Entertainment, Inc. Decentralized virtual trustless database for access control
US11257315B2 (en) 2016-02-04 2022-02-22 Carrier Corporation Encoder multiplexer for digital key integration
TWI570315B (en) * 2016-02-16 2017-02-11 立創智能股份有限公司 An electronic door locking system
CN107093228B (en) * 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock
CN107169398A (en) 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 Signal processing method and device
US10082877B2 (en) 2016-03-15 2018-09-25 Ford Global Technologies, Llc Orientation-independent air gesture detection service for in-vehicle environments
WO2017165349A1 (en) 2016-03-22 2017-09-28 Spectrum Brands, Inc. Garage door opener with touch sensor authentication
US10298577B1 (en) * 2016-03-31 2019-05-21 Amazon Technologies, Inc. Credential vending to processes
KR102583765B1 (en) 2016-04-06 2023-10-04 오티스 엘리베이터 컴파니 Mobile Visitor Management
WO2017180381A1 (en) * 2016-04-11 2017-10-19 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
CN109074690A (en) 2016-04-11 2018-12-21 开利公司 Communication user is captured when interacting with multiple access control apparatus to be intended to
CN109074618B (en) * 2016-04-11 2024-04-09 开利公司 Capturing user intent while interacting with multiple access controls
US11341795B2 (en) 2016-04-11 2022-05-24 Carrier Corporation Capturing behavioral user intent when interacting with multiple access controls
CA3171256A1 (en) 2016-04-15 2017-10-19 Schlage Lock Company Llc Wireless credential proximity control
US9914415B2 (en) 2016-04-25 2018-03-13 Ford Global Technologies, Llc Connectionless communication with interior vehicle components
CN109071154B (en) * 2016-04-27 2021-10-22 通力股份公司 Elevator and access system
DE102016108013B3 (en) * 2016-04-29 2017-06-14 Fujitsu Technology Solutions Intellectual Property Gmbh Method for a system for safely opening a door and system for safely opening a door
US10134210B1 (en) * 2016-05-17 2018-11-20 Amtech Systems, LLC Vehicle tracking system using smart-phone as active transponder
US20170339343A1 (en) * 2016-05-17 2017-11-23 Tijee Corporation Multi-functional camera
US10043332B2 (en) 2016-05-27 2018-08-07 SkyBell Technologies, Inc. Doorbell package detection systems and methods
WO2017203339A1 (en) * 2016-05-27 2017-11-30 ISN-Partners Ltd. Computer implemented method for assistance
US20180005467A1 (en) * 2016-06-29 2018-01-04 International Business Machines Corporation Multi-user hotel tracking and check-in
US10248898B2 (en) 2016-06-29 2019-04-02 Spectrum Brands, Inc. Passive RFID door lock
TWI737755B (en) * 2016-06-29 2021-09-01 美商品譜公司 Passive rfid door lock, electronic door lock system and operation method thereof
AU2017286911A1 (en) 2016-06-30 2019-01-24 Alarm.Com Incorporated Scheduled temporary rental property access
US11145016B1 (en) 2016-06-30 2021-10-12 Alarm.Com Incorporated Unattended smart property showing
US10380429B2 (en) 2016-07-11 2019-08-13 Google Llc Methods and systems for person detection in a video feed
CN106162530B (en) * 2016-07-18 2019-04-16 北京千丁互联科技有限公司 A kind of access control management method, system and background server
DE102016009189B4 (en) * 2016-07-25 2022-10-06 Heiko Kersten Automatic release scenario for house entrance doors, especially for postal delivery company staff
US10647294B2 (en) * 2016-08-31 2020-05-12 Faraday & Future Inc. Remotely granting vehicle permissions
US9741186B1 (en) 2016-09-01 2017-08-22 International Business Machines Corporation Providing wireless access to a secure lock based on various security data
DE102016117214A1 (en) * 2016-09-13 2018-03-15 Huf Hülsbeck & Fürst Gmbh & Co. Kg Method for opening and closing a device
US10277283B2 (en) * 2016-09-14 2019-04-30 Sony Corporation NFC device, reader/writer device and methods for authorizing and performing an update
US10004028B2 (en) 2016-09-22 2018-06-19 International Business Machines Corporation Paired smart device theft deterrent
WO2018063438A1 (en) * 2016-09-29 2018-04-05 The Regents Of The University Of California Visible light communication system-on-a-chip
US10438463B2 (en) 2016-10-14 2019-10-08 ASSA ABLOY Residential Group, Inc. Access control system and method
US11933076B2 (en) 2016-10-19 2024-03-19 Dormakaba Usa Inc. Electro-mechanical lock core
US11310294B2 (en) 2016-10-31 2022-04-19 Microsoft Technology Licensing, Llc Companion devices for real-time collaboration in communication sessions
US20180130159A1 (en) * 2016-11-10 2018-05-10 Wal-Mart Stores, Inc. Systems and methods for delivering products via autonomous ground vehicles to restricted areas designated by customers
US10360744B1 (en) 2016-11-17 2019-07-23 Alarm.Com Incorporated Verified access to a monitored property
CN109964186A (en) * 2016-11-22 2019-07-02 福特汽车公司 Remote independent ride sharing supervision
EP3327686B1 (en) * 2016-11-23 2022-11-02 Insys Microelectronics GmbH Method for managing an opening state of a value container and system therefor
AU2017363273A1 (en) 2016-11-23 2019-06-06 Alarm.Com Incorporated Detection of authorized user presence and handling of unauthenticated monitoring system commands
US11111698B2 (en) 2016-12-05 2021-09-07 Endura Products, Llc Multipoint lock
CN110024004B (en) * 2016-12-06 2021-11-19 亚萨合莱有限公司 Providing service provider access to locks
CN110036419B (en) * 2016-12-06 2021-09-07 亚萨合莱有限公司 Providing access to a lock through a service consumer device
US10909791B2 (en) 2016-12-16 2021-02-02 Assa Abloy Ab Methods and devices for physical access control systems
AU2017383108B2 (en) * 2016-12-22 2021-12-23 Automatic Technology (Australia) Pty Ltd Method, system and software product for providing temporary access to an area controlled by network-connected endpoint devices
US10360746B1 (en) * 2016-12-30 2019-07-23 Alarm.Com Incorporated Controlled indoor access using smart indoor door knobs
CN110169031B (en) 2017-01-09 2023-09-19 开利公司 Access control system with local mobile key distribution
EP3566213B1 (en) * 2017-01-09 2023-07-19 Carrier Corporation Access control system with messaging
EP3349187B1 (en) * 2017-01-12 2022-09-21 dormakaba Deutschland GmbH Method for providing at least one drive parameter of at least one door system
US11468439B2 (en) * 2017-01-12 2022-10-11 American Express Travel Related Services Company, Inc. Systems and methods for blockchain based proof of payment
US10876324B2 (en) 2017-01-19 2020-12-29 Endura Products, Llc Multipoint lock
WO2018136740A2 (en) * 2017-01-23 2018-07-26 Carrier Corporation Access control system with trusted third party
US10810999B2 (en) 2017-01-26 2020-10-20 Hall Labs Llc Voice-controlled secure remote actuation system
KR20180090111A (en) * 2017-02-02 2018-08-10 삼성전자주식회사 Method and apparatus for providing network information repository service
US10347063B1 (en) * 2017-03-01 2019-07-09 Alarm.Com Incorporated Authorized smart access to a monitored property
US10769877B2 (en) 2017-03-02 2020-09-08 OpenPath Security Inc. Secure handsfree proximity-based access control
GB201704629D0 (en) * 2017-03-23 2017-05-10 Glue Ab Automated delivery security system
JP7122586B2 (en) * 2017-03-23 2022-08-22 パナソニックIpマネジメント株式会社 Door phone system and its communication method
US20180283051A1 (en) * 2017-04-03 2018-10-04 U-Tec Group Inc Wireless controlled fingerprint smart lock
US20180295513A1 (en) * 2017-04-06 2018-10-11 Walmart Apollo, Llc Authentication system using nfc tags
US10986812B2 (en) * 2017-04-21 2021-04-27 Lois Melinda Nowling Pad-n-paw
WO2018204221A1 (en) 2017-05-02 2018-11-08 Carrier Corporation A regional lock-state control system with people locator capability
US10148513B1 (en) * 2017-05-10 2018-12-04 International Business Machines Corporation Mobile device bandwidth consumption
US10081334B1 (en) * 2017-05-17 2018-09-25 Alpine Electronics, Inc. Method and system for unlocking vehicle with use of morse code
US11783010B2 (en) 2017-05-30 2023-10-10 Google Llc Systems and methods of person recognition in video streams
US10217304B2 (en) * 2017-06-12 2019-02-26 Ivtes Ltd. Intelligent vehicular electronic key system
US10528228B2 (en) * 2017-06-21 2020-01-07 Microsoft Technology Licensing, Llc Interaction with notifications across devices with a digital assistant
WO2019003246A1 (en) 2017-06-26 2019-01-03 Nasdaq, Inc. Systems and methods for enterprise web application dashboard management
US10621839B2 (en) 2017-07-31 2020-04-14 Comcast Cable Communications, Llc Next generation monitoring system
US11285915B2 (en) * 2017-08-09 2022-03-29 M2MD Technologies, Inc. Method and system for using a wireless mobile device as a smart key
MY194318A (en) * 2017-08-28 2022-11-28 Timetec Holding Sdn Bhd Mobile-based access control system
EP3450265B1 (en) * 2017-09-04 2019-12-18 Polestar Performance AB Method and system for passive start of a vehicle
US10332325B2 (en) * 2017-09-05 2019-06-25 Suprema Inc. Access control system and access control method using the same
US10445956B2 (en) 2017-09-05 2019-10-15 OpenPath Security Inc. Access control reader for secure handsfree access with mobile devices
US10599826B2 (en) 2017-09-05 2020-03-24 OpenPath Security Inc. Decoupled authorization for restricted resource access
FI20175797A1 (en) * 2017-09-08 2019-03-09 Ovaa Oy Electronic locking device and apparatus for providing an authorization to unlock a door lock
WO2019051337A1 (en) 2017-09-08 2019-03-14 Dormakaba Usa Inc. Electro-mechanical lock core
US10909825B2 (en) 2017-09-18 2021-02-02 Skybell Technologies Ip, Llc Outdoor security systems and methods
US10664688B2 (en) 2017-09-20 2020-05-26 Google Llc Systems and methods of detecting and responding to a visitor to a smart home environment
US10679446B2 (en) * 2017-09-20 2020-06-09 Carrier Corporation Extended instant guest access using near field communication tags
US11134227B2 (en) 2017-09-20 2021-09-28 Google Llc Systems and methods of presenting appropriate actions for responding to a visitor to a smart home environment
US11539520B2 (en) * 2017-10-04 2022-12-27 Delphian Systems, LLC Emergency lockdown in a local network of interconnected devices
US11823273B2 (en) * 2017-10-06 2023-11-21 BlueOwl, LLC System and method for preventing fraud in the capture of trip telemetry data
US20190111890A1 (en) * 2017-10-12 2019-04-18 Hitachi, Ltd. Terminal-vehicle linking method, terminal-vehicle linking apparatus, and terminal-vehicle linking program
NL2019806B1 (en) * 2017-10-26 2019-05-06 4Suites B V Device for controlling a door lock actuator, and system comprising such device
US11164408B2 (en) * 2017-10-31 2021-11-02 Sargent Manufacturing Company Lock systems and methods
US10755500B2 (en) * 2017-11-06 2020-08-25 Moca System Inc. Access control system and access control method using the same
US11450158B2 (en) 2018-01-05 2022-09-20 Spectrum Brands, Inc. Touch isolated electronic lock
US10574890B2 (en) 2018-01-12 2020-02-25 Movidius Ltd. Methods and apparatus to operate a mobile camera for low-power usage
KR102501245B1 (en) * 2018-02-14 2023-02-17 삼성전자주식회사 Method and electronic device for providing key
FR3078093B1 (en) * 2018-02-22 2022-04-29 Psa Automobiles Sa EMERGENCY OPENING OF ELECTRIC LOCKS OF DAMAGED MOTOR VEHICLES
KR102540090B1 (en) * 2018-03-06 2023-06-05 삼성전자주식회사 Electronic device and method for managing electronic key thereof
US11069164B2 (en) * 2018-03-20 2021-07-20 VIZpin, Inc. System for managing mobile devices
US11100146B1 (en) * 2018-03-23 2021-08-24 Amazon Technologies, Inc. System management using natural language statements
EP3776325A1 (en) * 2018-04-11 2021-02-17 Assa Abloy AB Managing administration privileges of an electronic lock
EP3553775B1 (en) * 2018-04-12 2020-11-25 Spotify AB Voice-based authentication
US11466473B2 (en) 2018-04-13 2022-10-11 Dormakaba Usa Inc Electro-mechanical lock core
CA3097041C (en) 2018-04-13 2022-10-25 Dormakaba Usa Inc. Electro-mechanical lock core
BR112020021774A2 (en) * 2018-04-24 2021-02-23 Air Stayz Pty Limited methods and systems for reserving resources and managing access to reserved resources
US10783731B2 (en) * 2018-04-27 2020-09-22 Spectrum Brands, Inc. Wireless tag-based lock actuation systems and methods
CN110415392B (en) 2018-04-27 2023-12-12 开利公司 Entry control system based on early posture
US10521987B1 (en) * 2018-06-11 2019-12-31 Ford Global Technologies, Llc Enhanced electrified vehicle charger security
CN108964762B (en) * 2018-07-23 2020-05-29 京东方科技集团股份有限公司 Visible light communication device, driving method thereof, door lock and visible light communication method
US11032705B2 (en) * 2018-07-24 2021-06-08 Carrier Corporation System and method for authenticating user based on path location
US20200043271A1 (en) * 2018-08-03 2020-02-06 Therma-Tru Corporation Electronic door system
RU2703659C1 (en) * 2018-08-20 2019-10-21 Ивтес Лтд. Vehicle intelligent electronic key system
MX2021002895A (en) * 2018-09-14 2021-08-24 Spectrum Brands Inc Authentication of internet of things devices, including electronic locks.
US10915995B2 (en) 2018-09-24 2021-02-09 Movidius Ltd. Methods and apparatus to generate masked images based on selective privacy and/or location tracking
AU2018101489A4 (en) * 2018-10-05 2018-11-15 Ammendolia, Domenic MR sMART lock
EP3847630A1 (en) * 2018-10-09 2021-07-14 Assa Abloy Ab Physical access control system and method
WO2020081501A1 (en) 2018-10-16 2020-04-23 Aeris Communications, Inc. Method and system for pairing wireless mobile device with iot device
JP7238346B2 (en) * 2018-11-02 2023-03-14 日本電気株式会社 Information processing device, control program for information processing device, and communication terminal
US10951616B2 (en) 2018-11-02 2021-03-16 Spruce Labs, Inc. Proximity-based device authentication
WO2020097022A1 (en) 2018-11-06 2020-05-14 Carrier Corporation Access control system with sensor
US20200193745A1 (en) * 2018-12-15 2020-06-18 Richard Joseph Morris Wireless control of linear electromagnetic actuator child proof system
US10964141B2 (en) * 2018-12-18 2021-03-30 Ncr Corporation Internet-of-things (IoT) enabled lock with management platform processing
US11201873B2 (en) 2018-12-19 2021-12-14 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and voice command
US11140175B2 (en) 2018-12-19 2021-10-05 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and short-range communication
US10769872B2 (en) * 2018-12-19 2020-09-08 T-Mobile Usa, Inc. Multi-factor authentication with geolocation and short-range communication with indoor-outdoor detection
US10748391B2 (en) * 2018-12-27 2020-08-18 Immersion Corporation Haptic signal conversion system
US11352817B2 (en) 2019-01-25 2022-06-07 Noke, Inc. Electronic lock and interchangeable shackles
US10614646B1 (en) * 2019-01-30 2020-04-07 Eaton Intelligent Power Limited Lockout/tagout system and method including multi-user lockout device with electronic locking and wireless control interface
US11189117B2 (en) * 2019-01-30 2021-11-30 Zhuhai Unitech Power Technology Co., Ltd. Method and system for controlling a smart lock
RU2699438C1 (en) * 2019-02-04 2019-09-05 Общество с ограниченной ответственностью "БОРДЕР" Door electromechanical latch for locking device
US10796512B2 (en) 2019-02-05 2020-10-06 Dish Network L.L.C. Automated physical package delivery with end-to-end package security
US20200284066A1 (en) * 2019-03-07 2020-09-10 Logistics and Supply Chain MultiTech R&D Centre Centre Limited Locking device for use in logistic management, a control system for the locking device and a method for controlling the locking device
US11900744B2 (en) * 2019-03-22 2024-02-13 Eingot Llc Virtual intercom system
US11257247B2 (en) * 2019-03-28 2022-02-22 Schlage Lock Company Llc Camera-based door position system
US11639617B1 (en) 2019-04-03 2023-05-02 The Chamberlain Group Llc Access control system and method
US11746565B2 (en) 2019-05-01 2023-09-05 Endura Products, Llc Multipoint lock assembly for a swinging door panel
USD912492S1 (en) * 2019-05-20 2021-03-09 Altro Smart Inc. Lock set
US10832509B1 (en) 2019-05-24 2020-11-10 Ademco Inc. Systems and methods of a doorbell device initiating a state change of an access control device and/or a control panel responsive to two-factor authentication
US10789800B1 (en) 2019-05-24 2020-09-29 Ademco Inc. Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device
RU194556U1 (en) * 2019-06-25 2019-12-16 Акционерное общество "Уфанет" Remote control device for intercom via global Internet
US11140165B2 (en) * 2019-07-22 2021-10-05 Bank Of America Corporation System for selective mapping of distributed resources across network edge framework for authorized user access
US11704950B2 (en) 2019-08-08 2023-07-18 Skeleton Key Systems, LLC Retail security system
US11902778B2 (en) * 2019-08-13 2024-02-13 Milwaukee Electric Tool Corporation Credentialed wireless fob to control power tool devices
JP2022545039A (en) 2019-08-24 2022-10-24 スカイベル テクノロジーズ アイピー、エルエルシー Doorbell communication system and method
US10970950B2 (en) * 2019-08-30 2021-04-06 Ademco Inc. Systems and methods for activating a security action responsive to proximal detection and identification of a wireless device
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
SE1951047A1 (en) * 2019-09-16 2021-03-17 Assa Abloy Ab Evaluating access to a physical space
US10952077B1 (en) 2019-09-30 2021-03-16 Schlage Lock Company Llc Technologies for access control communications
SE1951100A1 (en) * 2019-09-30 2021-03-31 Assa Abloy Ab Enabling remote unlock of a lock
US11069169B2 (en) * 2019-10-16 2021-07-20 Alex Jen Huang System and method for remotely controlling locks on depositories
US11256392B2 (en) 2019-11-01 2022-02-22 Microsoft Technology Licensing, Llc Unified interfaces for paired user computing devices
US11304246B2 (en) 2019-11-01 2022-04-12 Microsoft Technology Licensing, Llc Proximity-based pairing and operation of user-specific companion devices
US11546391B2 (en) 2019-11-01 2023-01-03 Microsoft Technology Licensing, Llc Teleconferencing interfaces and controls for paired user computing devices
EP3819876B1 (en) * 2019-11-06 2023-11-22 Industrilås I Nässjö AB Handle arrangement with user authentication
NL2024201B1 (en) * 2019-11-08 2021-07-20 Kibba Ip B V Space access control module and remote key provisioning system
EP3828860A1 (en) * 2019-11-28 2021-06-02 dormakaba Schweiz AG Method for outputting a message of a sensor system
EP3828857A1 (en) * 2019-11-28 2021-06-02 dormakaba Schweiz AG Sensor system
EP3832613A1 (en) * 2019-11-28 2021-06-09 dormakaba Schweiz AG Sensor system for a closing element, in particular a door or window
GB2590357B (en) * 2019-11-28 2022-12-21 Paxton Access Ltd Access control system and method
KR20210071452A (en) * 2019-12-06 2021-06-16 현대자동차주식회사 Network system, vehicle and control method thereof
US11893795B2 (en) 2019-12-09 2024-02-06 Google Llc Interacting with visitors of a connected home environment
US10757574B1 (en) * 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US11676432B2 (en) 2020-03-17 2023-06-13 Sony Group Corporation Electronic device, an access control device, and related methods
US11736836B2 (en) * 2020-03-27 2023-08-22 Deng Ip Holder, Llc Mobile secure network system and device
US11356432B2 (en) * 2020-03-27 2022-06-07 Securkart Llc Mobile secure network system and device
US11574513B2 (en) 2020-03-31 2023-02-07 Lockfob, Llc Electronic access control
EP3905208A1 (en) * 2020-04-30 2021-11-03 R+V Allgemeine Versicherung AG System for retrofitting an electromechanical door
CN111726247A (en) * 2020-05-29 2020-09-29 惠州拓邦电气技术有限公司 Electronic lock firmware updating method and device, electronic lock and storage medium
AT523889A1 (en) * 2020-06-05 2021-12-15 Blum Gmbh Julius Wireless receiving and sending
US11354960B2 (en) * 2020-06-17 2022-06-07 Ricoh Company, Ltd. Intermediary server, remote control system, and mediating method
KR20220015845A (en) * 2020-07-31 2022-02-08 주식회사 모카시스템 Reader and control method thereof
USD1002217S1 (en) 2020-09-14 2023-10-24 Innovative Vending Solutions Llc Massage chairs with a display device and a partition
USD979270S1 (en) 2020-09-14 2023-02-28 Innovative Vending Solutions Llc Massage chair with kiosk display and partition
US11959308B2 (en) 2020-09-17 2024-04-16 ASSA ABLOY Residential Group, Inc. Magnetic sensor for lock position
EP3975496A1 (en) * 2020-09-29 2022-03-30 Hewlett-Packard Development Company, L.P. Inductive electric unlock
AU2021372307A1 (en) * 2020-10-30 2023-06-01 Healthsafe Nz Limited Access control systems, methods and devices
IT202100006761A1 (en) * 2021-03-22 2022-09-22 Iopen Srl ACCESS GATE CONTROL AND MANAGEMENT SYSTEM
GB2605452A (en) * 2021-04-01 2022-10-05 Era Home Security Ltd Improved Door Lock
US11288907B1 (en) * 2021-04-01 2022-03-29 Yais Co., Ltd. Smart electronic lock and the method for using same
WO2022214184A1 (en) * 2021-04-08 2022-10-13 Assa Abloy Ab Pacs modification to incorporate lacs authentication
US11373470B1 (en) * 2021-04-12 2022-06-28 Toyota Motor Engineering & Manufacturing North America, Inc. Systems and methods for unlocking a digital lock
FR3122017A1 (en) * 2021-04-15 2022-10-21 Vauban Systems ACCESS CONTROL SYSTEM
US20220392285A1 (en) * 2021-06-08 2022-12-08 Carrier Corporation Monitoring items in an area accessible through an electronic locking device
CA3224336A1 (en) * 2021-06-16 2022-12-22 Assa Abloy Americas Residential Inc. Multifamily electronic lock credential management
US11783649B2 (en) * 2021-08-24 2023-10-10 Wai Kin CHEUNG Cloud door lock control system with identification of time varied 2D codes
WO2023031909A1 (en) * 2021-09-03 2023-03-09 Interqr Ltd Entry authorization system and method therefor
US20230162551A1 (en) * 2021-11-19 2023-05-25 Schlage Lock Company Llc Technologies for using nfc or qr code to commission a device to the cloud
USD993000S1 (en) 2021-12-20 2023-07-25 ASSA ABLOY Residential Group, Inc. Lock
USD992999S1 (en) 2021-12-20 2023-07-25 ASSA ABLOY Residential Group, Inc. Lock
US11804091B2 (en) * 2022-02-14 2023-10-31 Wai Kin CHEUNG Cloud door lock control system with identification of time varied 2D codes and images
WO2023161188A1 (en) * 2022-02-22 2023-08-31 Assa Abloy Ab Communicating a media stream between a guest device and an approval device for evaluating whether to unlock an electronic lock
WO2023227222A1 (en) * 2022-05-26 2023-11-30 Glue Ab Smart lock and method of transmitting a status of a smart lock
EP4303839A1 (en) * 2022-07-05 2024-01-10 dormakaba Schweiz AG Electronic locking state monitoring of a utility closing system
FR3140195A1 (en) * 2022-09-22 2024-03-29 Psa Automobiles Sa Method and device for transmitting data for attempting to register hands-free access devices for vehicles

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060170533A1 (en) * 2005-02-03 2006-08-03 France Telecom Method and system for controlling networked wireless locks
CN101329779A (en) * 2008-05-20 2008-12-24 深圳市中兴集成电路设计有限责任公司 Method and system for publishing information using gate inhibition/work attendance system
US20100176919A1 (en) * 2009-01-13 2010-07-15 Peter Christian Myers One-time access for electronic locking devices
US20100306549A1 (en) * 2008-01-30 2010-12-02 Evva Sicherheitstechnologie Gmbh Method and device for managing access control

Family Cites Families (94)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AT8482B (en) 1899-06-09 1902-07-25 Julius Schwarz Grinding machine for facets of unequal length on glass vessels.
AT8481B (en) 1900-07-13 1902-07-25 Boehmer & Co G M B H Locking device for folding feet on tables and benches.
US6236365B1 (en) 1996-09-09 2001-05-22 Tracbeam, Llc Location of a mobile station using a plurality of commercial wireless infrastructures
US6134593A (en) 1997-09-30 2000-10-17 Cccomplete, Inc. Automated method for electronic software distribution
US6204763B1 (en) 1999-03-22 2001-03-20 Jujitsu Limited Household consumable item automatic replenishment system including intelligent refrigerator
US7062532B1 (en) 1999-03-25 2006-06-13 Autodesk, Inc. Method and apparatus for drawing collaboration on a network
US6529949B1 (en) 2000-02-07 2003-03-04 Interactual Technologies, Inc. System, method and article of manufacture for remote unlocking of local content located on a client device
US7350139B1 (en) * 2000-06-16 2008-03-25 American Express Travel Related Services Company, Inc. System and method for utilizing a drag and drop technique to complete electronic forms
US6933832B1 (en) 1999-11-09 2005-08-23 Noel Simms Automated receiving and delivery system and method
JP2003515688A (en) * 1999-11-30 2003-05-07 ボーディング データ エーエス Electronic key device, system, and method for managing electronic key information
US7035916B1 (en) 2000-02-16 2006-04-25 Microsoft Corporation Coupling a filter graph space to a network driver space
US6793253B2 (en) 2000-03-24 2004-09-21 Azotec (Pty) Ltd. Lock
US20010040422A1 (en) 2000-04-06 2001-11-15 Gramlich Jeffrey D. Method and system for providing and using a parcel keeper
IT1315488B1 (en) 2000-08-01 2003-02-18 Stefano Franchin WAREHOUSE FOR THE STORAGE OF OBJECTS PROVIDED WITH A TRANSPONDER
US7120697B2 (en) 2001-05-22 2006-10-10 International Business Machines Corporation Methods, systems and computer program products for port assignments of multiple application instances using the same source IP address
US6574455B2 (en) 2000-08-30 2003-06-03 Lucent Technologies Inc. Method and apparatus for ensuring security of users of bluetooth TM-enabled devices
AU2001286951A1 (en) * 2000-09-01 2002-03-13 Braun Corporation Electronic controller for vehicular wheelchair access
EP1840854B1 (en) 2000-10-20 2011-04-06 Promega Corporation Radio frequency identification method and system of distributing products
CA2324679A1 (en) 2000-10-26 2002-04-26 Lochisle Inc. Method and system for physical access control using wireless connection to a network
WO2002045029A2 (en) 2000-11-03 2002-06-06 Vistant Corporation Method and apparatus for associating the movement of goods with the identity of an entity moving these goods
US6853853B1 (en) 2000-11-15 2005-02-08 Ford Motor Company Remote control system for operating selected functions of a vehicle
JP2002229955A (en) * 2001-02-02 2002-08-16 Matsushita Electric Ind Co Ltd Information terminal device and authentication system
US20020147919A1 (en) 2001-02-03 2002-10-10 Gentry Daniel W. Secured delivery system for unattended receiving and shipping of parcels and letters
US7237013B2 (en) 2001-04-16 2007-06-26 National Instruments Corporation Network system including data socket components for accessing internet semaphores
US7194010B2 (en) 2001-05-02 2007-03-20 Strix Systems, Inc. Wireless base station to base station synchronization in a communication system, such as a system employing a short range frequency hopping or time division duplex scheme
FI114183B (en) * 2001-06-07 2004-08-31 Elisa Oyj Method and system for controlling a remote device by means of a terminal under the control of a central unit
US7260835B2 (en) 2001-06-19 2007-08-21 Intel Corporation Bluetooth™ based security system
US6950725B2 (en) 2001-12-07 2005-09-27 General Electric Company Home latch-key web based automation system
US6967562B2 (en) 2002-02-22 2005-11-22 Royal Thoughts, Llc Electronic lock control and sensor module for a wireless system
US6965294B1 (en) 2002-02-28 2005-11-15 Kimball International, Inc. Workspace security system
US7847675B1 (en) 2002-02-28 2010-12-07 Kimball International, Inc. Security system
US7100049B2 (en) * 2002-05-10 2006-08-29 Rsa Security Inc. Method and apparatus for authentication of users and web sites
AU2003248640A1 (en) 2002-06-05 2003-12-22 Navitag Technologies, Inc. Reusable self contained electronic device providing in-transit cargo visibility
US7600301B2 (en) 2002-06-19 2009-10-13 Telezygology, Inc. Fixing and release systems and fastener networks
TW577032B (en) 2002-06-28 2004-02-21 Hoa Telecom Network Co Ltd Intercom system
CN1682005A (en) 2002-07-13 2005-10-12 罗格·烘伯 Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop DSS)
KR20040035952A (en) * 2002-10-12 2004-04-30 서창준 Coming and going management system using mobile phone.
US7193644B2 (en) 2002-10-15 2007-03-20 Revolutionary Concepts, Inc. Automated audio video messaging and answering system
DE10317499A1 (en) 2003-04-16 2004-11-04 Atmel Germany Gmbh Device for data exchange between devices in a motor vehicle and an input / output terminal
US20050060063A1 (en) 2003-09-11 2005-03-17 Genesearch Pty Ltd. Automated item dispensing systems
US20050080898A1 (en) 2003-10-08 2005-04-14 Block Jerald J. System and method for managing computer usage
US6987452B2 (en) 2003-11-13 2006-01-17 Sunney Yang iBOX with home delivery auto-receipt system
CN1957154A (en) * 2004-03-12 2007-05-02 总锁有限责任公司 Remote control security device
US7205908B2 (en) 2004-03-18 2007-04-17 Gallen Ka Leung Tsui Systems and methods for proximity control of a barrier
US20050204787A1 (en) 2004-03-19 2005-09-22 Nick Ernst Hotel in-room safe automated control and communication system
US7379805B2 (en) 2004-07-14 2008-05-27 United Parcel Service Of America, Inc. Wirelessly enabled trailer locking/unlocking
US7786891B2 (en) 2004-08-27 2010-08-31 Embarq Holdings Company, Llc System and method for an interactive security system for a home
US7450934B2 (en) 2004-09-14 2008-11-11 Siemens Communications, Inc. Apparatus and method for IM to PTT correlation of mobile phones as associated devices
AT501039A1 (en) 2004-11-04 2006-05-15 Sorex Wireless Solutions Gmbh SYSTEM FOR OPERATING A TERMINAL
US7339349B2 (en) 2005-02-09 2008-03-04 Dallab Inc Sdn Bhd Battery replacement mechanism for mobile device
US20060190419A1 (en) 2005-02-22 2006-08-24 Bunn Frank E Video surveillance data analysis algorithms, with local and network-shared communications for facial, physical condition, and intoxication recognition, fuzzy logic intelligent camera system
FI20055344A0 (en) * 2005-06-23 2005-06-23 Jouni Koljonen Data transfer system for passage control
CN102710976B (en) 2005-07-22 2014-12-10 袋鼠传媒股份有限公司 System and methods for enhancing the experience of spectators attending a live sporting event
US7553173B2 (en) 2005-12-30 2009-06-30 Click, Inc. Vehicle connector lockout apparatus and method of using same
US8636172B2 (en) 2006-01-05 2014-01-28 Lawrence A. Dunn Devices, systems and methods for point-of-use medication control
US7975287B2 (en) 2006-02-01 2011-07-05 Research In Motion Limited System and method for validating a user of an account using a wireless device
US20070193834A1 (en) 2006-02-21 2007-08-23 Adt Security Services, Inc. System and method for remotely attended delivery
EP2008257A2 (en) 2006-03-30 2008-12-31 Asher S. Saban Protecting children and passengers with respect to a vehicle
JP4857992B2 (en) 2006-07-31 2012-01-18 富士ゼロックス株式会社 Electronic file conversion program, electronic file conversion device, and electronic file conversion system.
US7746223B2 (en) 2006-12-01 2010-06-29 Embarq Holdings Company, Llc System and method for receiving security content from wireless cameras
US8195944B2 (en) * 2007-01-04 2012-06-05 Motorola Solutions, Inc. Automated method for securely establishing simple network management protocol version 3 (SNMPv3) authentication and privacy keys
US7734181B2 (en) 2007-04-09 2010-06-08 Ajang Bahar Devices, systems and methods for ad hoc wireless communication
US20080298230A1 (en) 2007-05-30 2008-12-04 Luft Siegfried J Scheduling of workloads in a distributed compute environment
US20090037217A1 (en) 2007-07-19 2009-02-05 Bilcare Limited Multi-functional package system
DE102007036964A1 (en) 2007-08-04 2009-02-05 Hans Turck Gmbh & Co. Kg Transformers for intrinsically safe devices of data transmission technology
CN101494009A (en) * 2008-01-24 2009-07-29 上海英颁斯物流科技有限公司 Apparatus and method for identifying container being unlocked
US20090230768A1 (en) 2008-03-17 2009-09-17 The Chamberlain Group, Inc. Method and Apparatus to Facilitate the Provision of Electrical Power As Pertains to a Self-Storage Facility
US9024890B2 (en) 2008-05-17 2015-05-05 David H. Chin Comparison of an applied gesture on a touch screen of a mobile device with a remotely stored security gesture
NZ615317A (en) 2008-06-27 2014-12-24 Schlage Lock Co Electronic door lock with modular components
US8224313B2 (en) 2008-09-24 2012-07-17 Centurylink Intellectual Property Llc System and method for controlling vehicle systems from a cell phone
US8018329B2 (en) 2008-12-12 2011-09-13 Gordon * Howard Associates, Inc. Automated geo-fence boundary configuration and activation
US8093986B2 (en) 2009-01-20 2012-01-10 Lock II, L.L.C. Self-powered electronic lock
US20100201536A1 (en) * 2009-02-10 2010-08-12 William Benjamin Robertson System and method for accessing a structure using a mobile device
US8255983B2 (en) * 2009-03-31 2012-08-28 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for email communication
KR20170010097A (en) * 2009-06-08 2017-01-25 집카, 인크 Mobile device application for communicating with vehicles
US8045961B2 (en) 2009-06-22 2011-10-25 Mourad Ben Ayed Systems for wireless authentication based on bluetooth proximity
US20110106329A1 (en) 2009-11-03 2011-05-05 GRIDbot, LLC Methods and apparatus for charging station with sms user interface
WO2011084963A2 (en) 2010-01-05 2011-07-14 Iota, Inc. Mobile communications resource management system
US20110227712A1 (en) 2010-03-18 2011-09-22 Atteck Marvin R Computerized multiple technology based vehicle alarm system and method
CN103026682A (en) * 2010-06-16 2013-04-03 德尔斐系统有限公司 Wireless device enabled locking system
US20120007735A1 (en) 2010-07-07 2012-01-12 Paragon Gps, Inc. Wearable Device and System for Tracking a Person's Location
US20120280783A1 (en) 2011-05-02 2012-11-08 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US20140310379A1 (en) 2013-04-15 2014-10-16 Flextronics Ap, Llc Vehicle initiated communications with third parties via virtual personality
US9624695B1 (en) 2013-03-15 2017-04-18 August Home, Inc. Intelligent door lock system with WiFi bridge
US9647996B2 (en) 2013-03-15 2017-05-09 August Home, Inc. Low power device with encryption
US9447609B2 (en) 2013-03-15 2016-09-20 August Home, Inc. Mobile device that detects tappings/vibrations which are used to lock or unlock a door
US9382739B1 (en) 2013-03-15 2016-07-05 August Home, Inc. Determining right or left hand side door installation
US9359794B2 (en) 2014-03-12 2016-06-07 August Home, Inc. Method for operating an intelligent door knob
US9916746B2 (en) 2013-03-15 2018-03-13 August Home, Inc. Security system coupled to a door lock system
US9704320B2 (en) 2013-03-15 2017-07-11 August Home, Inc. Intelligent door lock system with encryption
US9326094B2 (en) 2013-03-15 2016-04-26 August Home, Inc. BLE/WiFi bridge with audio sensor
US9704314B2 (en) 2014-08-13 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of Bluetooth LE devices at an exterior of a dwelling
US9727328B2 (en) 2013-03-15 2017-08-08 August Home Inc. Intelligent door lock system with firmware updates
US9779571B2 (en) 2015-05-02 2017-10-03 Kyu Han Chong Method, system, and computer-readable medium relating to internet of things-enabled remote controls

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060170533A1 (en) * 2005-02-03 2006-08-03 France Telecom Method and system for controlling networked wireless locks
US20100306549A1 (en) * 2008-01-30 2010-12-02 Evva Sicherheitstechnologie Gmbh Method and device for managing access control
CN101329779A (en) * 2008-05-20 2008-12-24 深圳市中兴集成电路设计有限责任公司 Method and system for publishing information using gate inhibition/work attendance system
US20100176919A1 (en) * 2009-01-13 2010-07-15 Peter Christian Myers One-time access for electronic locking devices

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10708410B2 (en) 2011-05-02 2020-07-07 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US10382608B2 (en) 2011-05-02 2019-08-13 The Chamberlain Group, Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
CN106460408A (en) * 2014-04-07 2017-02-22 卡巴伊科有限公司 Temporarily pairing a mobile device with a peripheral device
CN107251105A (en) * 2014-10-19 2017-10-13 阿赫塔尔·哈利勒 Motor vehicle security protection and vehicle security system
CN105698844A (en) * 2014-11-24 2016-06-22 江苏省精创电气股份有限公司 Temperature and humidity recorder safety control method
CN107004314B (en) * 2014-12-02 2022-05-17 开利公司 Remote programming for access control systems using virtual card data
CN107004314A (en) * 2014-12-02 2017-08-01 开利公司 For the long-range programming of the metering-in control system using virtual card data
CN104639536A (en) * 2015-01-05 2015-05-20 浪潮(北京)电子信息产业有限公司 Method and system for preventing network attack
CN105799542A (en) * 2015-03-11 2016-07-27 孙欣 Electric vehicle control system and method
US11018862B2 (en) 2015-06-05 2021-05-25 Apple Inc. Relay service for communication between controllers and accessories
CN107683601A (en) * 2015-06-05 2018-02-09 苹果公司 Relay services for the communication between controller and annex
US11831770B2 (en) 2015-06-05 2023-11-28 Apple Inc. Relay service for communication between controllers and accessories
US10057062B2 (en) 2015-06-05 2018-08-21 Apple Inc. Relay service for communication between controllers and accessories
CN107683601B (en) * 2015-06-05 2019-05-21 苹果公司 Relay services for the communication between controller and attachment
CN110113427A (en) * 2015-06-05 2019-08-09 苹果公司 Relay services for the communication between controller and attachment
CN110113427B (en) * 2015-06-05 2022-09-02 苹果公司 Relay service for communication between controller and accessory
TWI676372B (en) * 2015-06-05 2019-11-01 美商蘋果公司 Method for communication between controllers and accessories via relay service
CN106485812A (en) * 2015-08-25 2017-03-08 韩华综合化学株式会社 The control system and method for locking device
CN105608765A (en) * 2015-09-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access authorization control method and device
CN105261104B (en) * 2015-11-24 2017-10-10 重庆理工大学 Bluetooth door lock system and its control method based on intelligent terminal
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN106355714B (en) * 2016-08-31 2019-08-13 郑成富 A kind of fingerprint lock management system and method
CN106355714A (en) * 2016-08-31 2017-01-25 郑成富 Fingerprint lockset management system and method
US10713869B2 (en) 2017-08-01 2020-07-14 The Chamberlain Group, Inc. System for facilitating access to a secured area
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US11562610B2 (en) 2017-08-01 2023-01-24 The Chamberlain Group Llc System and method for facilitating access to a secured area
US11574512B2 (en) 2017-08-01 2023-02-07 The Chamberlain Group Llc System for facilitating access to a secured area
US11941929B2 (en) 2017-08-01 2024-03-26 The Chamberlain Group Llc System for facilitating access to a secured area
CN107749097A (en) * 2017-09-28 2018-03-02 上海若禅信息科技有限公司 A kind of blue-tooth intelligence door lock awakening method and method for unlocking
CN111480185A (en) * 2017-12-15 2020-07-31 亚萨合莱有限公司 Provisioning credential sets when network connectivity is unavailable
US11200763B2 (en) 2017-12-15 2021-12-14 Assa Abloy Ab Providing credential set when network connection is unavailable
CN112189221A (en) * 2018-04-24 2021-01-05 品谱股份有限公司 Certificate provisioning for electronic lock authentication of a server
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
CN110145187A (en) * 2019-06-18 2019-08-20 前海随身宝(深圳)科技有限公司 Control method for electronic lock, device, intelligent luggage and readable storage medium storing program for executing

Also Published As

Publication number Publication date
US10708410B2 (en) 2020-07-07
CA2834964A1 (en) 2012-11-08
WO2012151290A1 (en) 2012-11-08
US20150102906A1 (en) 2015-04-16
US20120280790A1 (en) 2012-11-08
US20180191889A1 (en) 2018-07-05
US20150181014A1 (en) 2015-06-25
US20200329136A1 (en) 2020-10-15
US20190342443A1 (en) 2019-11-07
US10382608B2 (en) 2019-08-13
EP2710562A1 (en) 2014-03-26
US20120280783A1 (en) 2012-11-08
US20120280789A1 (en) 2012-11-08
US20140365773A1 (en) 2014-12-11

Similar Documents

Publication Publication Date Title
CN103635940A (en) Systems and methods for controlling a locking mechanism using a portable electronic device
US9378598B2 (en) Wireless access control system and related methods
US11663867B2 (en) Digital certificate and reservation
US11244524B2 (en) System and method for managing electronic locks
CA2632298C (en) Integrated access control system and a method of controlling the same
US11164413B2 (en) Access control system with secure pass-through
JP2011511350A (en) Access control management method and apparatus
CN104020740A (en) Parking management system based on ground lock remotely controlled by mobile terminal
WO2014107196A1 (en) Wireless access control system and related methods
CN104735168A (en) Unlocking method of network-based password generation and decryption
KR20220103090A (en) Mobile digital lock technology
US20220014388A1 (en) Virtual security guard
JP2016184875A (en) Key data communication system
Raju et al. Smart lock controlled using voice call
WO2023280277A1 (en) Control method and system
KR101996890B1 (en) Control system and method for locking device
JP2015149608A (en) history data notification system
JP6273572B2 (en) Authentication control system, gateway device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140312